CAD REU Exercises - Boise State University
Transcription
CAD REU Exercises - Boise State University
CAD REU Exercises June 5, 2015 1 Games 1.1. Consider the game G(M, S, A) where M is a positive integer, S is a set of positive integers, and A is a subset of {0, 1, · · · , min(S)}. Determine, for the following two examples, whether player ONE has a winning strategy: (a) G(103, {6, 9}, {0, 2, 4}) (b) G(103, {7, 11}, {0, 2, 4, 6}) (c) G(103, {6, 9}, A), where A has only one element. 1.2. In each case, describe an explicit winning strategy for the winning player. 1.3. Now consider the normal play versions of these three games, and answer the above questions for these. 2 Cryptography 1.1. Alice and Bob choose a key space K containing 25 6 keys. Eve build a special computer that can check 10,000,000,000 per second. (a) How much time does it take Eve to check half of the keys K? (b) Alice and Bob replace the keyspace with a larger set containing 2n different keys. How large should Alice and Bob choose n in order to force Eve’s computer to spend 100 years checking half of the keys (assume that each year has 365 days)? For many years the US government used a symmetric key cipher (Data Encryption Standard) that used 56 bit keys. During the 1990s, cryptographers built special computers and demonstrated that 56 bits keys do not provide enough security. 1.2. Alice and Bob use a symmetric key cryptosystem in which their private key is a large prime number k and their plaintext and ciphertext are integers. Bob encrypts a message by computing the product c = m × k. Eve intercepts the following two ciphertexts: c1 = 12849217045006222 and c2 = 6485880443666222. Find the shared private key k. 1 1.3. Alice and Bob created the following symmetric key crypto system: • The messages (plain texts) will be integers with at most n digits, that is, elements of Z10n = {0, 1, · · · , 10n − 1}. • Their shared private key will be some large integer k. • Encryption proceeds √ as follows: As illustration, assume that Alice is the encryptor. Calculate k up to n decimal digits, and discard all digits preceding the decimal point, as well as the decimal point: Keep the remaining n digits. Call this number κ. Then, encrypt the message m ∈ Z10n by calculating e = m + κ mod 10n . • Decryption proceeds by subtracting κ from e in Z10n . Show that the number κ is given by the formula √ √ κ = b10n · ( k − b kc)c 3 1.4. Number Theory Please do the following problems. (a) Show that ax ≡ ax mod φ(n) mod n (b) Find all primitive roots modulo 8, 9, and 11. Does very number have a primitive root? How many primitive roots each number has? (c) Compute the value of 2(p−1)/2 mod p for every prime 2 < p < 20. Make a conjecture for possible values of 2(p−1)/2 mod p when p is prime. Prove your conjecture. 2