Assignment III - B.E. VI Semester: A B A B A B A B
Assignment III - B.E. VI Semester: A B A B A B A B
VI Semester
3. Find the computational cost (in terms of bit operation) of key generation in RSA algo-
rithm.
6. Let (N, e) be an RSA public key. Given the private key d, show that one can efficiently
factor the modulus N .
7. Alice and Bob have the same modulus n for RSA, and encryption exponents eA and eB
with gcd(eA , eB ) = 1. Charles sends them the same message m encrypted with these
keys, resulting in the ciphertexts cA and cB . Adversary intercepts both cA and cB . How
can she find m?
11. Let p be an odd prime. Then show that there are exactly (p − 1)/2 quadratic residues
modulo p and exactly (p − 1)/2 quadratic non residues modulo p.
12. Let g is the generator of the cyclic group Zp . Show that g is quadratic non residue mod
p.
16. Show that computing the square root of a QR in ZN is as hard as factoring N. (Hint:
When the factorization of N = pq is known one computes the square root of x ∈ ZN ∗ by
first computing the square root in Zp of x mod p and the square root in Zq of x mod q
and then using the CRT to obtain the square root of x in ZN ).
18. Let sender A sends the same message M to three different receivers using their respective
public keys that have same e = 3 but different value of n. Let’s assume you can intercept
all three transmission. Can you find plaintext M in feasible time.
20. If m is chosen from a small list of possible values (m < 2l , m has l − bits). Show that
attacker can compute message m in time O(l2α ), l/2 < α < l which is better than brute
force method. (Meet in middle attack)
21. Let (Gen,E,D) be a chosen ciphertext secure public-key encryption system with message
space {0, 1}128 . Which of the following is also chosen ciphertext secure?
22. Alice and Bob wish to resolve a dispute over telephone. We can encode the possibilities
of the dispute by a binary value. For this they engage a protocol:
(i). Alice → Bob : Alice picks up randomly an x, which is a 200 bit number and
computes the function f(x). Alice sends f(x) to Bob.
(ii). Bob → Alice : Bob tells Alice whether x was even parity or odd parity.
(iii). Alice → Bob : Alice then sends x to Bob, so that Bob can verify whether his
guess was correct. If Bob’s guess was right, Bob wins. Otherwise Alice has the dispute
solved in her own way. They decide upon the following function, f : X → Y , where X
is a random variable denoting a 200 bit sequence and Y is a random variable denoting
a 100 bit sequence. The function f is defined as follows: f (x) = ( the most significant
100 bits of x) ∨ (the least significant 100 bits of x), ∀x ∈ X Here ∨ denotes bitwise OR.
Answer the following questions in this regard:
(i). Suppose Bob’s strategy to guess the even or odd of x is that if least significant bit
of f (x) is zero then x is even else x is odd. If Alice is honest, what is the probability of
Bob to be successful in guessing whether x is even or odd correctly?
(ii). What is Alice’s probability of cheating Bob?
(iii). What happens when the above function (∨) is replaced by bit-wise XOR? Rework
the above sub-parts for this change,
2
23. Given a positive rational number ab , Find a finite Continued Fraction expansion and the
Convergents of continued expansion of the following.
33 34
(i) 95 (ii) 99 .
24. Write Wiener’s algorithm. Suppose that n = 317940011 and b = 77537081 in the RSA
cryptosystem. Using Wiener’s algorithm, attempt to factor it.