2013 Exam 1
2013 Exam 1
4. Assume a company with 200 employees. A new security policy demands encrypted
message exchange with a symmetric cipher. How many keys are required, if a secret
communication is ensured for every possible pair of communicating parties?
A. 199 B. 200 C. 1990 D. 2000 E. None of the above
6. The encryption of the block cipher IDEA mixes operations from three different
algebraic groups. Which is NOT one of the groups?
A. ({0, 1}16, (XOR)) B. (Z65536, + mod 65536)
C. (S16, ◦ (composition)) D. (Z65537*, mod 65537) E. None of the above
7. Let mi’s and ci’s be plaintext and ciphertext blocks respectively. With a decryption
algorithm d and a key k, which is the decryption operation of CBC mode for i > 1?
A. mi = dk (ci) mi1 B. mi = dk (ci mi1)
C. mi = dk (ci) ci1 D. mi = dk (ci ci1) E. None of the above
8. The block cipher SAFER (Secure And Fast Encryption Routine) has the 8-bit S-box
constructed by S(x) = 45x mod 257, where 256 is represented by 0. Apparently,
(Z257*, ) = <45>, i.e., 45 is a generator (primitive root) of the cyclic group Z257*.
Which of the following mappings is NOT a bijective 8-bit S-box?
A. S(x) = 455x mod 257 B. S(x) = 456x mod 257
C. S(x) = 459x mod 257 D. S(x) = 4515x mod 257 E. None of the above
9. Which stream cipher has the keystream
generation shown by the figure, where
one byte K is generated in each iteration?
A. RC4 B. SEAL C. Crypto1
D. A5/1 E. None of the above
Complete the table of key lengths of algorithms for different security levels:
Algorithm Family Cryptosystems Security Level (bit)
80 128 192 256
Symmetric-key PRESENT, AES 80 128 192 256
Elliptic Curves ECDH, ECDSA 160 256 27 512
Integer Factorization, RSA, DSA, ElGamal, 1024 28 7680 15360
Discrete Logarithm DH (Diffie-Hellman)
31 (3 points) The internal structure of the stream cipher Trivium is shown as the
following diagram on the textbook. Unfortunately, this diagram is wrong.
32 (7 points)
(i) Besides P(x) = x4 + x + 1, list all irreducible polynomials of degree 4 over GF(2).
(ii) Factor x16 x over GF(2).
(iii) Compute (x3 + x + 1) / (x2 + x) in GF(24) which is represented by P(x).
Cryptography Midterm Exam 2013/04/16
Name: ____________ Student ID number: ____________
1 2 3 4 5 6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
26 27 28 29 30
31
32
Cryptography Midterm Exam 2013/04/16
Solution
1 2 3 4 5 6 7 8 9 10
D A B E B C C B A A
11 12 13 14 15
2 3 10 17 15
16 17 18 19 20
0, 0, 0 AB BD CEF 173
21 22 23 24 25
31
32
(i) x4 + x3 + 1, x4 + x3 + x2 + x + 1
(ii) x (x + 1) (x2 + x + 1) (x4 + x + 1) (x4 + x3 + 1) (x4 + x3 + x2 + x + 1)
(iii) x2 [(x2 + x)1 = x2 + x + 1]