or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
Cryptography and computer security - Tutorial 13.10.2020
Cryptanalysis of classical ciphers
Hill cipher:
Vigenère cipher:
Exercise 1
One reasonable idea for enhancing the security of a cryptosystem is to use double encryption. Is double encryption with the Hill cipher any safer than simple encryption? Justify your answer.
Exercise 2
Encrypt the message LJUBLJANA using the Vigenère cipher with the key FRI. Compute the index of coincidence of the obtained ciphertext.
Computation of the index of coincidence
Exercise 3
The following ciphertext has been encrypted with the Vigenère cipher. Find the possible key lengths with the Kasiski test. Word divisions have not been preserved.
Repetitions:
NKA
: 0, 30, offset: 30BYIYPWZ
: 6, 33, offset: 27Key length candidates: divisors of \(\gcd(30, 27) = 3\)
Decrypting the ciphertext
Algorithms with numbers
\(a, b \in \mathbb{Z}_p\), \(n\) digits long (in an \(\alpha\)-based system), \(n \approx \log_\alpha(a)\)
Exercise 4
Calculate \(3^6 \bmod{17}\) using the square-and-multiply algorithm.