- Page 1: Author (David R. Kohel) /Title (Cry
- Page 5 and 6: 6.2 Properties of Stream Ciphers .
- Page 8: CHAPTERONEIntroduction to Cryptogra
- Page 11 and 12: The string monoids A ∗ form a ver
- Page 13 and 14: To recover to our original notion,
- Page 15 and 16: SUPPOSETHATWEFIRSTENCODEAMESSAGEBYP
- Page 17 and 18: This gives the encoded plaintext:HU
- Page 19 and 20: ZYXWVUT T T TSRQPONNMLKJIIH H HGFEE
- Page 21 and 22: IIHDYOOWSAEONUAPVCNTGSIEKDHHREYSEES
- Page 24 and 25: CHAPTERTHREEElementary Cryptanalysi
- Page 26 and 27: Examples of CryptanalysisLet’s be
- Page 28 and 29: Exercise. Explain why ciphertext fo
- Page 30 and 31: # 1 2 3 4 5 6 7 8 9 10 113 Z A Z K2
- Page 33 and 34: Exercise 3.3 For each of the crypto
- Page 35 and 36: Two statistical measures that we ca
- Page 37 and 38: What is the maximum value of x log
- Page 39 and 40: 4.4 Conditional EntropyWe can now d
- Page 41 and 42: Exercise 4.2 Show that the rate of
- Page 43 and 44: involving the repetition of an inte
- Page 45 and 46: 5.2 Digital Encryption Standard Ove
- Page 47 and 48: 5.4.1 Electronic Codebook Mode (ECB
- Page 49 and 50: the deciphered plaintext block M
- Page 51 and 52: 3. Error propagation. An error in a
- Page 54 and 55:
CHAPTERSIXStream CiphersA stream ci
- Page 56 and 57:
Before discussing the mathematical
- Page 58 and 59:
Periods of LFSR’sWe begin with so
- Page 60 and 61:
Linear feedback shift registers (LF
- Page 62 and 63:
LFSR Cryptosystems We introduce new
- Page 64 and 65:
CHAPTERSEVENElementary Number Theor
- Page 66 and 67:
we find similarly that x 7 = (x 5 +
- Page 68 and 69:
Theorem 7.8 The cyclotomic polynomi
- Page 70:
If a, b, and c are as above, then f
- Page 73 and 74:
Symmetric Cryptography ProtocolInit
- Page 75 and 76:
on the difficulty of factoring n, o
- Page 77 and 78:
and similarlym 2 = c d 2mod 23 ≡
- Page 79 and 80:
aise both sides to the power m, the
- Page 81 and 82:
andom prime, gcd, xgcd, and inverse
- Page 84 and 85:
CHAPTERNINEDigital SignaturesA digi
- Page 86:
3. The spender remains anonymous un
- Page 89 and 90:
Shamir’s scheme is defined for a
- Page 92 and 93:
APPENDIXASAGE ConstructionsSAGE is
- Page 94 and 95:
sage: x = 2sage: type(x)sage: y = 2
- Page 96 and 97:
at the command line:sage: x = 2sage
- Page 98 and 99:
A set in SAGE (i.e. Python) represe
- Page 100 and 101:
sage: S = ’This\n is\n a \n strin
- Page 102 and 103:
APPENDIXBSAGE CryptosystemsString m
- Page 104 and 105:
CryptosystemsSpecific cryptosystem
- Page 106 and 107:
Solution.The inverse of the above s
- Page 108 and 109:
APPENDIXCSolutions to ExercisesIntr
- Page 110 and 111:
sage: (r,s) = (7,5)sage: G = Symmet
- Page 112 and 113:
1 : 0.04128012438455552 : 0.0424744
- Page 114 and 115:
sage: X = pt.frequency_distribution
- Page 116 and 117:
where N is the total number of char
- Page 118 and 119:
Solution.By rearranging the sum∑
- Page 120 and 121:
where X = K ⊕ M = (X 1 , X 2 , X
- Page 122 and 123:
Solution. The data of a LFSR diagra
- Page 124 and 125:
Unlike the encoding function strip
- Page 126 and 127:
Exercise 6.11 Since the LFSR is the
- Page 128 and 129:
is 624499148328708779 — pretty mu
- Page 130 and 131:
We would like to compute the value
- Page 132 and 133:
With a value of 128, the modulus is
- Page 134 and 135:
1. Fermat’s little theorem tells
- Page 136 and 137:
Then verify that c n 5= a 129n 5and
- Page 138 and 139:
APPENDIXDRevision ExercisesLet A be
- Page 140 and 141:
4. (∗) The polynomial g(x) = x 6
- Page 142 and 143:
2. We find log 7 (2) = 48 in F 89 a