Ex. 1 Cramer-Shoup cryptosystem
- Detail the construction of the Cramer-Shoup cryptosystem.
- Explain why this cryptosystem is secure even against adapative chosen ciphertext attacks (no formal proof is required, only some basic explanations).
- Compare this construction to the Elgamal cryptosystem (highlight the similarities and differences). 2 Simple questions
- Let p be a prime and be an integer such that p { . Explain why h(x) x mod p is not a good cryptographic hash function.
- Express 230i for i = 2,3,5 and 10, in hexadecimal. Compare your results to the constants Ki, 0 i 79, in SHA-1.
Ex. 3 Birthday paradox
In this exercise we derive the approximation of the probability of having at least one match in a list of length r over n possible birthdays.
- Let f (x) = ln(1 x) and g(x) = ln(1 x) + x + x2. Study the functions f and g over [0, 1/2] and conclude that over this interval
x x2 ln(1 x) x.
- Prove that if r n/2 then
(r 1)r r3
______ ____
2n 3n2
(r 1)r.
n) ______
2n
- Let = r2/(2n), and suppose n/8. Prove that
| eec1/sqrtn | jjj (1 where c1 = I (2)3/2 and c2 = n), V2 3 V2j=1 |
- Prove that when n is large and is a constant less than n/8, then r1~ ~
~ 1 j e.n
j=1
Ex. 4 Birthday attack
Suppose we observe 40 licence plates, each ending with a 3-digit number.
- What is the probability of seeing two plates ending with the same three digits?
- Assuming we have one ending with 123. What is the probability that one of the 40 license plates observed has the same 3 last digits?
- Explain how these results relate to how Alice overcomes the birthday attack in chapter 5.
Ex. 5 Faster multiple modular exponentiation
Let ,, a, b and n be five integers. The most obvious strategy for compute ab mod n consists in using the modular exponentiation (Square and Multiply) algorithm (3.38) to compute a mod n, and b mod n and then multiply the results mod n.
- What is the time complexity of this method?
- Assuming the product is known, rewrite the square and multiply algorithm, such that at most one multiplication is calculated at each iteration.
- Suppose a and b are l bits long; how many squaring and multiplications are necessary to compute ab mod n ?
- Implement the two strategies and compare their speed on large numbers.

![[Solved] VE475 Introduction to Cryptography Homework 7](https://assignmentchef.com/wp-content/uploads/2022/08/downloadzip.jpg)

![[Solved] VE475 Introduction to Cryptography Homework 1](https://assignmentchef.com/wp-content/uploads/2022/08/downloadzip-1200x1200.jpg)
Reviews
There are no reviews yet.