TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 31 October 2017

Similar documents
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Public Key Cryptography and RSA

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Channel Coding and Cryptography Part II: Introduction to Cryptography

Chapter 9. Public Key Cryptography, RSA And Key Management

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Public Key Cryptography and the RSA Cryptosystem

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck

RSA. Public Key CryptoSystem

Introduction to Cryptography Lecture 7

Uzzah and the Ark of the Covenant

Public Key Algorithms

Key Exchange. Secure Software Systems

Implementation and Benchmarking of Elliptic Curve Cryptography Algorithms

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

1. Diffie-Hellman Key Exchange

Introduction to Cryptography Lecture 7

Key Management and Distribution

CS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA.

Public Key Algorithms

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

CIS 3362 Final Exam 12/4/2013. Name:

CS669 Network Security

Chapter 9 Public Key Cryptography. WANG YANG

Cryptography and Network Security

Abhijith Chandrashekar and Dushyant Maheshwary

Cryptography and Network Security

Public-Key Cryptanalysis

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Public Key Cryptography

Public Key Algorithms

Encryption 2. Tom Chothia Computer Security: Lecture 3

Number Theory and RSA Public-Key Encryption

Lecture 6: Overview of Public-Key Cryptography and RSA

Public-key encipherment concept

Overview. Public Key Algorithms I

Crypto CS 485/ECE 440/CS 585 Fall 2017

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

0x1A Great Papers in Computer Security

Midterm Exam. CS381-Cryptography. October 30, 2014

Lecture 6 - Cryptography

CS 161 Computer Security

Chapter 3 Public Key Cryptography

Oblivious Transfer(OT)

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

Digital Signatures. KG November 3, Introduction 1. 2 Digital Signatures 2

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Other Topics in Cryptography. Truong Tuan Anh

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Lecture 2 Applied Cryptography (Part 2)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

I.D. NUMBER SURNAME OTHER NAMES

Applied Cryptography and Computer Security CSE 664 Spring 2018

CSC 474/574 Information Systems Security

Elliptic Curve Public Key Cryptography

CPSC 467: Cryptography and Computer Security

Public Key Cryptography

E-th roots and static Diffie-Hellman using index calculus

Blum-Blum-Shub cryptosystem and generator. Blum-Blum-Shub cryptosystem and generator

Chapter 7 Public Key Cryptography and Digital Signatures

CS 161 Computer Security

Cryptographic Systems

An effective Method for Attack RSA Strategy

Introduction to Cryptography Lecture 11

RSA (algorithm) History

Public Key Encryption

CSC 5930/9010 Modern Cryptography: Public Key Cryptography

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

Strong Password Protocols

Lecture 2 Algorithms with numbers

Diffie-Hellman Protocol as a Symmetric Cryptosystem

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Provable Partial Key Escrow

Cryptography III Want to make a billion dollars? Just factor this one number!

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

Diffie-Hellman. Part 1 Cryptography 136

Introduction to Elliptic Curve Cryptography

Kurose & Ross, Chapters (5 th ed.)

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Homework 1 CS161 Computer Security, Spring 2008 Assigned 2/4/08 Due 2/13/08

RSA Cryptography in the Textbook and in the Field. Gregory Quenell

Some Stuff About Crypto

Math236 Discrete Maths with Applications

CS 161 Computer Security

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

Lecture 20 Public key Crypto. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller and Bailey s ECE 422

Computer Security 3/23/18

Transcription:

Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 31 October 2017 Name : TU/e student number : Exercise 1 2 3 4 5 6 total points Notes: Please hand in this sheet at the end of the exam. You may keep the sheet with the exercises. This exam consists of 6 exercises. You have from 13:30 16:30 to solve them. You can reach 100 points. Make sure to justify your answers in detail and to give clear arguments. Document all steps, in particular of algorithms; it is not sufficient to state the correct result without the explanation. If the problem requires usage of a particular algorithm other solutions will not be accepted even if they give the correct result. All answers must be submitted on TU/e letterhead; should you require more sheets ask the proctor. State your name on every sheet. Do not write in red or with a pencil. You are allowed to use any books and notes, e.g. your homework. You are not allowed to use the textbooks of your colleagues. You are allowed to use a calculator without networking abilities. Usage of laptops and cell phones is forbidden.

1. This problem is about the Diffie-Hellman key exchange. The system uses the multiplicative group IF p modulo the prime p = 23689. The element g = 11 IF 23689 has order 23688 and is thus a generator of the full multiplicative group. (a) Alice chooses a = 222 as her secret key. Compute Alice s public key. 1 point (b) Alice receives h b = g b = 22938 from Bob as his Diffie-Hellman keyshare. Compute the key shared between Alice and Bob, using Alice s secret key g a from the first part of this exercise. 2 points 2. This problem is about RSA encryption. (a) Alice chooses p = 439 and q = 349. Compute Alice s public key (n, e), using e = 2 16 + 1, and the matching private key d. 2 points (b) Bob uses public key (n, e) = (443507, 11) and secret key d = 241187. He receives ciphertext c = 64649. Decrypt the ciphertext. 2 points (c) Decrypt the same message as under b) but this time using RSA with CRT for p = 659 and q = 673. Make sure to document your computation, i.e., state the values for c p, d p,... 4 points 3. This exercise is about computing discrete logarithms in the multiplicative group of IF p for p = 23689. The element g = 11 has order l = 23688. The factorization of p 1 is p 1 = 2 3 3 2 7 47. Use the Pohlig-Hellman attack to compute the discrete logarithm b of Bob s key h b = g b = 22938, i.e. (a) Compute b modulo 2 3 by first computing b modulo 2, then modulo 2 2 and finally modulo 2 3. 4 points (b) Compute b modulo 3 2 by first computing b modulo 3 and then modulo 3 2. 5 points (c) Compute b modulo 7. 4 points (d) Compute b modulo 47 using the Baby-Step Giant-Step attack in the subgroup of order 47 7 points (e) Combine the results above to compute b. Verify your answer. 4 points 1

4. This exercise is about factoring n = 443507. (a) Use the p 1 method to factor n = 443507 with basis a = 13 and exponent s = lcm{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}. Make sure to state the value for s and the result of the exponentiation modulo n. Determine both factors of n. 4 points (b) Use Pollard s rho method for factorization to find a factor of 329 with iteration function x i+1 = x 2 i + 3 and Floyd s cycle finding method, i.e. after each increment in i compute gcd(x 2i x i, 329) until a non-trivial gcd is found. Start with x 0 = 3. 5 points (c) Use the result of b) to explain why the factorization in a) was successful. Note that 673 1 = 2 5 3 7 (factored completely) and 659 1 = 2 329. 3 points 5. (a) Find all affine points, i.e. points of the form (x, y), on the Edwards curve x 2 + y 2 = 1 + 5x 2 y 2 over IF 17. 9 points (b) Verify that P = (5, 10) is on the curve. Compute the order of P. Hint: You may use information learned about the order of points on Edwards curves. 10 points (c) Translate the curve and P to Montgomery form Bv 2 = u 3 + Au 2 + u, i.e. compute A, B and the resulting point P. Verify that the resulting point P is on the Montgomery curve. 6 points (d) The point Q = (1, 16) is on the Montgomery curve with A = 14, B = 1 over IF 17. Compute 3Q. 10 points 6. Lots of applications in cryptography require random numbers. The power generator generates random numbers in IF p by taking random powers of a generator, i.e., computing random number x as x = g r in IF p for some fixed g. 2

(a) Company C wants to generate numbers coprime to 3, 5, 7, 11, and 13. They choose to pick 5 small random numbers r 1, r 2,..., r 5, compute x 2 r 1 mod 3 x 3 r 2 mod 5 x 3 r 3 mod 7 x 2 r 4 mod 11 x 2 r 5 mod 13 and then combine these five congruences using the Chinese Remainder Theorem (CRT) to a single number x modulo 3 5 7 11 13 = 15015. Explain why the resulting numbers are coprime to 3, 5, 7, 11, and 13. Compute how many different numbers can be generated using this method. 6 points (b) Company S wants to simplify the code and picks a single number as generator, so x is computed picking 5 small random numbers r 1, r 2,..., r 5 as before and solving the following CRT for x. x 2 r 1 mod 3 x 2 r 2 mod 5 x 2 r 3 mod 7 x 2 r 4 mod 11 x 2 r 5 mod 13 Compute how many different numbers can be generated using the method of company S. 3 points (c) Impatient company I additionally wants to avoid the CRT step and generates numbers coprime to 15015 by taking a larger random number r < 15015 and computing x 5477 r mod 15015. Compute how many different numbers can be generated using the method of company I. Verify your answer. 9 points 3