11.07.2015 Views

Cryptography - Sage

Cryptography - Sage

Cryptography - Sage

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Exercise 6.9 Compute the first 8 terms of the linear complexity profile of the coefficientsequence from Exercise 1.Exercise 6.10 Practice encoding and enciphering with the LFSR stream cryptosystem.The function binary decoding easily converts this back to ASCII text. Use these functionsto verify that PT is just the binary encoding of the original plaintext message and that theciphertext is enciphered.Exercise 6.11 Since the LFSR is the bitsum of the binary keystream, generated by theconnection polynomial and initial state, why must the inverse key be equal to the key itself?58 Chapter 6. Stream Ciphers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!