06.03.2017 Views

Mathematics for Computer Science

e9ck2Ar

e9ck2Ar

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“mcs” — 2017/3/3 — 11:21 — page 360 — #368<br />

360<br />

Chapter 9<br />

Number Theory<br />

Problem 9.75.<br />

Let<br />

S k D 1 k C 2 k C C p k ;<br />

where p is an odd prime and k is a positive multiple of p<br />

b 2 . p::0 such that<br />

S k a b .mod p/:<br />

1. Find a 2 Œ0::p/ and<br />

Problems <strong>for</strong> Section 9.11<br />

Practice Problems<br />

Problem 9.76.<br />

Suppose a cracker knew how to factor the RSA modulus n into the product of<br />

distinct primes p and q. Explain how the cracker could use the public key-pair<br />

.e; n/ to find a private key-pair .d; n/ that would allow him to read any message<br />

encrypted with the public key.<br />

Problem 9.77.<br />

Suppose the RSA modulus n D pq is the product of distinct 200 digit primes p and<br />

q. A message m 2 Œ0::n/ is called dangerous if gcd.m; n/ D p, because such an m<br />

can be used to factor n and so crack RSA. Circle the best estimate of the fraction<br />

of messages in Œ0::n/ that are dangerous.<br />

1<br />

200<br />

1<br />

400<br />

1 1 1 1<br />

200 10 10 200 400 10 10 400<br />

Problem 9.78.<br />

Ben Bitdiddle decided to encrypt all his data using RSA. Un<strong>for</strong>tunately, he lost his<br />

private key. He has been looking <strong>for</strong> it all night, and suddenly a genie emerges<br />

from his lamp. He offers Ben a quantum computer that can per<strong>for</strong>m exactly one<br />

procedure on large numbers e; d; n. Which of the following procedures should Ben<br />

choose to recover his data?<br />

Find gcd.e; d/.<br />

Find the prime factorization of n.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!