Crypto Assign 3
Crypto Assign 3
VI Semester
3. Find the computational cost (in terms of bit operation) of key generation in RSA algo-
rithm.
7. Let (N, e) be an RSA public key. Given the private key d, show that one can efficiently
factor the modulus N .
8. Alice and Bob have the same modulus n for RSA, and encryption exponents eA and eB
with gcd(eA , eB ) = 1. Charles sends them the same message m encrypted with these
keys, resulting in the ciphertexts cA and cB . Adversary intercepts both cA and cB . How
can she find m?
10. What is the 11th root of 2 in Z19 ? (i.e. what is 21/11 inZ19 ). Can you find the 6th root
of 2 in Z19 ? If yes find it else why not?
12. Let p be an odd prime. Then show that there are exactly (p − 1)/2 quadratic residues
modulo p and exactly (p − 1)/2 quadratic non residues modulo p.
13. Let g is the generator of the cyclic group Zp . Show that g is quadratic non residue mod
p.
14. Solve following quadratic congruent equation.
(i)b2 ≡ 44(mod 83)-
(ii)b2 ≡ 11(mod 29)
(iii)b2 ≡ 15(mod 59)
15. Using only CRT show that if x ∼
= y mod p and x ∼
= y mod q then x ∼
= y mod N . (5)
16. Show that computing the square root of a QR in ZN is as hard as factoring N. (Hint:
When the factorization of N = pq is known one computes the square root of x ∈ ZN ∗ by
first computing the square root in Zp of x mod p and the square root in Zq of x mod q
and then using the CRT to obtain the square root of x in ZN ).
17. Let sender A sends the same message M to three different receivers using their respective
public keys that have same e = 3 but different value of n. Let’s assume you can intercept
all three transmission. Can you find plaintext M in feasible time.
18. Show that text-RSA is vulnerable under following security notions.
(i) IND-CPA(semantic security) (ii) IND-CCA
19. If m is chosen from a small list of possible values (m < 2l , m has l − bits). Show that
attacker can compute message m in time O(l2α ), l/2 < α < l which is better than brute
force method. (Meet in middle attack)
20. Let (Gen,E,D) be a chosen ciphertext secure public-key encryption system with message
space {0, 1}128 . Which of the following is also chosen ciphertext secure?