Exercises

advertisement
Exercises about Symmetric Encryptions.
Exercises for the class on November 9 in Košice and December 4 in Utrecht:
1. Choose a Slovak word and a Caesar-key. Encrypt the word and exchange it with your
neighbor. Try to find the other’s word. (Utrecht students: if you do not know enough
Slovak words for this exercise, you may use a Dutch word in stead.)
2. (Assume letters are numbered from a=1 to z=26). Encrypt the word CAESAR with
the affine cipher, where the key is (3, 8).
3. Prove that the Affine system is perfectly secure if only a single letter is encrypted.
Is it better that the Caesar system in this case?
4. Compute the entropy of the language of Fibonacci strings: bit strings that do not
contain 2 consecutive 1’s.
Can you compute the entropy of the set of strings without three consecutive 1’s?
5. Alice and Bob exchange emails in their highly redundant natural language: the entropy
is only 20%.
What is the unicity distance when they use a cryptosystem with 256-bit keys (such as
the modern AES algorithm)? Compare this to the size of a small text email.
6. In the situation described in the previous exercise, Alice and Bob decide to use a text
compression program that provides a compression ratio of 1:3. What is the entropy
and redundancy of the resulting messages? How does this influence the unicity
distance?
7. The DES-cracking machine by the EFF is based on search units, each of which can
test 2.5 million keys per second. A single deep crack chip has 24 search units. One
board contains 64 of these chips, and a chassis has 12 boards. For a machine with six
chasses, how long does it take on average to find a DES key with a known plaintext
attack?
8. See previous question. The deep crack chip costs 5 dollars. How much do all chips of
the DES-cracker cost together?
9. Discuss the feasibility of building a DES-cracker in the imaginary situation that DES
were designed to have 112-bit keys.
10. There are DES keys that are self-inverting, meaning that encryption with k is exactly
the same function as decrypting with k. Can you give two of such keys?
11. Discuss the feasibility of a Hellman attack against a cryptosystem with 112-bit keys.
12. One GSM frame represents 4.6ms of conversation and has a 22-bit sequence number.
After how much time of conversation is a sequence number reused?
13. Prove that, using the Diffie-Hellman key exchange, Alice and Bob find the same
number to be used as a key.
Download