2013 Exam 2
2013 Exam 2
2. Let n be the bit length of the base field of ECC (Elliptic Curve Cryptography). What
is the computational complexity of ECC? Do not confuse it with “security level”.
A. O(n2) B. O(n3) C. O(n4) D. O(n5) E. None of the above
3. Let n be an RSA modulus with n = pq, where p and q are primes. Let e and d with
ed 1 (mod k) be public and private exponents of RSA respectively. Which is k?
A. pq + 1 C. pq + p + q + 1 B. pq 1 D. pq p q 1 E. None of the above
4. For which prime numbers p and q, a multiplicative cyclic group of order q can be
constructed as a subgroup of (Zp*, )? Cryptographic primitives based on the
discrete logarithm problem are operated on such groups.
A. p = 863, q = 109 B. p = 857, q = 107
C. p = 859, q = 103 D. p = 853, q = 101 E. None of the above
10. Which statement about key establishment with KDC (Key Distribution Center) is FALSE?
A. Every user shares a KEK (Key Encryption Key) with KDC and each other user
B. KDC sends session keys encrypted by KEKs to users
C. In a system with n users, only n long-term key pairs are required
D. If a new user is added, a secure key is only needed between the user and the KDC
E. None of the above
31 (4 points)
Apparently that there are 2 irreducible polynomials of degree 1 over GF(2):
x and x +1. Answer the following questions.
(a) How many monic irreducible polynomial of degree 1 over GF(22)?
(b) How many monic irreducible polynomial of degree 2 over GF(22)?
(c) How many irreducible polynomials of degree 5 over GF(2)?
(d) How many irreducible polynomials of degree 10 over GF(2)?
32 (6 points)
Let n be the output length in bit of a hash function h, and t mutually distinct
message (x1, x2, …, xt) be randomly selected to test collision h(xi) = h(xj).
(a) What is the probability for no collision among t hash values?
(b) What is the Taylor series at 0 for the function f (x) = ex ?
(c) Denote the probability of at least one collision by = 1 P(no collision).
Use the linear approximation of ex to deduce that
Cryptography Midterm Exam 2013/06/18
Name: ____________ Student ID number: ____________
1 2 3 4 5 6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
26 27 28 29 30
31 & 32
Cryptography Midterm Exam 2013/06/18
Solution
1 2 3 4 5 6 7 8 9 10
C B E B D C A D C A
11 12 13 14 15
384 t 1 rx a2 1 am
26 27 28 29 30
b2 192 77 3 190
31
25 −2 210 −25 −22 +2
(a) 4 (b) 6 (c) =6 (d) = 99
5 10
32