06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11.8. EXERCISES 229<br />

2. Given the weights 63, 39, 81, 57, 48 and 30, and being allowed to use them<br />

possibly multiple times, can the weight 283 be achieved. If so, how<br />

3. Given the weights 3, 7, 12, 23, 47, 95 and 190, and using each weight<br />

at most once, which <strong>of</strong> the following amounts can be realized, and how<br />

T = 323, T = 310, T = 117, T = 270.<br />

4. Given the weights 3, 8, 13, 29 and 60, and P = 129, e = 10:<br />

(a) Encipher gold.<br />

(b) Decipher 32, 84, 62, 146.<br />

5. Given the weights are 5, 8, 14, 29 and 58, and P = 127, e = 17. Decipher<br />

111, 70, 97, 66, 75, 105.<br />

6. Given the weights 6, 8, 17, 35, 81, 200, 403, 800, 1589, 3223 and e = 322,<br />

P = 6551:<br />

(a) Find the corresponding U’s.<br />

(b) Encipher stalactite.<br />

(c) Decipher 20632, 13837, 11968, 22524, 12265.<br />

the next word in the dictionary.<br />

Hint: it’s <strong>of</strong>ten<br />

7. [Hellman] Hellman’s 1979 Scientific American article, The Mathematics <strong>of</strong><br />

Public-Key Cryptography, was one <strong>of</strong> the very first public announcement<br />

<strong>of</strong> this new kind <strong>of</strong> cipher. Included in this article is an overview <strong>of</strong> public<br />

vs. private key, and an introduction to the Knapsack Ciphers and RSA.<br />

Here we look at his knapsack example.<br />

(a) Show that 3, 5, 11, 20, 41, 83, 169, 340, 679, 1358 forms a superincreasing<br />

sequence.<br />

(b) Use P = 2731 and e = 764 to find the corresponding U ′ s.<br />

(c) Hellman’s sample message was enciphered as pairs <strong>of</strong> letters (we<br />

have 10 weights), with the binary starting at 00000, so a=00000<br />

and z=11001. He also used the binary equivalent for 26 to represent<br />

a space, and 29 to represent .<br />

Encipher Hellman’s message: How are you.<br />

(d) Find d.<br />

(e) Decipher 2908, 7643, 9799.<br />

8. The public key codes tend to be slower on a computer than the traditional<br />

“private key” codes are. So they are most frequently used only to send<br />

the key for a traditional method.<br />

Decipher DNTFG EASCN HAFAO NNSBH SIOAI HEPTA CBROE EGFSR RBTGE<br />

ISIOT LAIEM C. It was enciphered using the double transposition method<br />

with keyword 94, 240, 155, 46, 197, 188, 151, 131.<br />

Hint: the W’s are 2, 7, 13, 31, 55, with P = 157 and e = 23.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!