06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.9. EXERCISES 49<br />

8. How do we encipher with a Decimation Cipher<br />

9. Is the deciphering process for a Decimation Cipher the same process as<br />

enciphering, or different Explain.<br />

10. How are the encipher key, deciphering key, and modulus in a Decimation<br />

Cipher related<br />

11. What is a multiplicative inverse<br />

12. Suppose we know a cipher is either a Caesar Cipher or a Decimation.<br />

Cipher. How can a frequency count help us determine which<br />

13. Can a frequency count help break a Decimation Cipher Explain.<br />

14. How many Decimation Ciphers are there modulo 26<br />

15. What does it mean to be a Public Key How does this differ from a<br />

Private Key<br />

16. What parts <strong>of</strong> the Kid-RSA are made public What parts are kept private<br />

17. How do Public Key systems differ from Private Key systems<br />

3.9 Exercises<br />

Show your work, and explain any non-standard steps.<br />

1. Find the following remainders.<br />

(a) 41%12.<br />

(b) 53%9.<br />

(c) 110%43.<br />

(d) 332%23.<br />

2. Find the following remainders.<br />

(a) 87%17.<br />

(b) 95%13.<br />

(c) 195%15.<br />

(d) 3389%201.<br />

3. Find the following remainders.<br />

(a) −8%10.<br />

(b) −37%11.<br />

(c) −621%34.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!