A Classical Introduction to Cryptography Exercise Book
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate
- PDF / 11,543,180 Bytes
- 262 Pages / 469.393 x 730.05 pts Page_size
- 44 Downloads / 204 Views
A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK
Thomas Baignkres EPFL, Switzerland
Pascal Junod EPFL, Switzerland
Yi Lu EPFL, Switzerland
Jean Monnerat EPFL, Switzerland
Serge Vaudenay EPFL, Switzerland
- Springer
Thomas Baignbres EPFL - I&C - LASEC Lausanne, Switzerland
Pascal Junod Lausanne, Switzerland
Yi Lu EPFL - I&C - LASEC Lausanne, Switzerland
Jean Monnerat EPFL-I&C-LASEC Lausanne, Switzerland
Serge Vaudenay Lausanne, Switzerland
Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 ISBN- 13: 978-0-387-27934-3
e-ISBN-10: 0-387-28835-X e-ISBN- 13: 978-0-387-28835-2
Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Printed in the United States of America. 9 8 7 6 5 4 3 2 1
SPIN 1151441 1.1 1552901
To Vale'rie and my parents To Mimi and Chloe' To my parents To Susan and my parents To Christine and Emilien
Contents
Foreword
xiii
1. PREHISTORY OF CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6
Mappings, etc. A Simple Substitution Cryptogram Product of Vigenkre Ciphers *One-Time Pad *Latin Squares Enigma
Solutions 2. CONVENTIONAL CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6 Exercise 7 Exercise 8 Exercise 9 Exercise 10 Exercise 11 Exercise 12 Exercise 13
Weak Keys of DES Semi-weak Keys of DES Complementation Property of DES 3DES Exhaustive Search 2DES and Two-Key 3DES *Exhaustive Search on 3DES An Extension of DES to 128-bit Blocks Attack Against the OFB Mode *Linear Feedback Shift Registers *Attacks on Cascade Ciphers Attacks on Encryption Modes I Attacks on Encryption Modes I1 *A Variant of A511 I
viii
EXERCISE BOOK Exercise 14 *A Variant of A511 I1 Exercise 15 *Memoryless Exhaustive Search
Solutions
3. DEDICATED CONVENTIONAL CRYPTOGRAPHIC PRIMITIVES Exercises Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise
1 2 3 4 5 6 7 8 9 10 11
Collisions in CBC Mode Collisions Expected Number of Collisions Multicollisions on Hash Functions Weak Hash Function Designs Collisions on a Mod
Data Loading...