Cryptography - Sage
Cryptography - Sage
Cryptography - Sage
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Exercise 6.9 Compute the first 8 terms of the linear complexity profile of the coefficientsequence from Exercise 1.Exercise 6.10 Practice encoding and enciphering with the LFSR stream cryptosystem.The function binary decoding easily converts this back to ASCII text. Use these functionsto verify that PT is just the binary encoding of the original plaintext message and that theciphertext is enciphered.Exercise 6.11 Since the LFSR is the bitsum of the binary keystream, generated by theconnection polynomial and initial state, why must the inverse key be equal to the key itself?58 Chapter 6. Stream Ciphers