A Classical Introduction to Cryptography Exercise Book

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate

  • PDF / 11,543,180 Bytes
  • 262 Pages / 469.393 x 730.05 pts Page_size
  • 44 Downloads / 204 Views

DOWNLOAD

REPORT


A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK

Thomas Baignkres EPFL, Switzerland

Pascal Junod EPFL, Switzerland

Yi Lu EPFL, Switzerland

Jean Monnerat EPFL, Switzerland

Serge Vaudenay EPFL, Switzerland

- Springer

Thomas Baignbres EPFL - I&C - LASEC Lausanne, Switzerland

Pascal Junod Lausanne, Switzerland

Yi Lu EPFL - I&C - LASEC Lausanne, Switzerland

Jean Monnerat EPFL-I&C-LASEC Lausanne, Switzerland

Serge Vaudenay Lausanne, Switzerland

Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 ISBN- 13: 978-0-387-27934-3

e-ISBN-10: 0-387-28835-X e-ISBN- 13: 978-0-387-28835-2

Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

Printed in the United States of America. 9 8 7 6 5 4 3 2 1

SPIN 1151441 1.1 1552901

To Vale'rie and my parents To Mimi and Chloe' To my parents To Susan and my parents To Christine and Emilien

Contents

Foreword

xiii

1. PREHISTORY OF CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6

Mappings, etc. A Simple Substitution Cryptogram Product of Vigenkre Ciphers *One-Time Pad *Latin Squares Enigma

Solutions 2. CONVENTIONAL CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6 Exercise 7 Exercise 8 Exercise 9 Exercise 10 Exercise 11 Exercise 12 Exercise 13

Weak Keys of DES Semi-weak Keys of DES Complementation Property of DES 3DES Exhaustive Search 2DES and Two-Key 3DES *Exhaustive Search on 3DES An Extension of DES to 128-bit Blocks Attack Against the OFB Mode *Linear Feedback Shift Registers *Attacks on Cascade Ciphers Attacks on Encryption Modes I Attacks on Encryption Modes I1 *A Variant of A511 I

viii

EXERCISE BOOK Exercise 14 *A Variant of A511 I1 Exercise 15 *Memoryless Exhaustive Search

Solutions

3. DEDICATED CONVENTIONAL CRYPTOGRAPHIC PRIMITIVES Exercises Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise Exercise

1 2 3 4 5 6 7 8 9 10 11

Collisions in CBC Mode Collisions Expected Number of Collisions Multicollisions on Hash Functions Weak Hash Function Designs Collisions on a Mod