Problems 6 2
Problems 6 2
5501 Cryptology
Homework 6
March 19, 2009
(a) Compute the values of the difference distribution table ND (a0 , b0 ) of the
function t, for a0 = 010 and a0 = 111 and b0 ∈ {0, 1}.
(b) A linear structure of a Boolean function f of three variables is defined as
a vector w = (w1 , w2 , w3 ) 6= (0, 0, 0) such that f (x⊕w)⊕f (x) is constant.
Show that t has exactly one linear structure.
(c) Show that t preserves complementation, that is, if each input bit is com-
plemented then the output is complemented.
(−1)a·x⊕b·πS (x)
X
x∈{0,1}m
(−1)a·x⊕b·πS (x)
X
x∈{0,1}m
Actually, this is nothing else but the Walsh transform of the Boolean function
b · πS (x), see Lecture 6. It follows that
1 X
NL (a, b) = 2m−1 + (−1)a·x⊕b·πS (x) .
2 x∈{0,1}m
for all n-bit mask values b, where the sum is taken over all m-bit mask
values a (enumerated from 0 to 2m − 1).
(b) Check the result in (a) for the linear approximation table in Fig. 3.2 of
the textbook.
4. Bob is using the RSA cryptosystem and his modulus is n = pq = 67 · 41. Show
that if the plaintext is 2009 then the ciphertext is equal to 2009.
5. (Stinson 5.14) The aim is to prove that the RSA Cryptosystem is not secure
against a chosen ciphertext attack.
(a) First, show that the encryption operation is multiplicative, that is, eK (x1 x2 ) =
eK (x1 )eK (x2 ), for any two plaintexts x1 and x2 .
(b) Next, use the multiplicative property to construct an example about how
to decrypt a given ciphertext y by obtaining the decryption x̂ of a different
(but related) ciphertext ŷ.