2015 Exam 1
2015 Exam 1
6. Which (k, nr) is legal for AES where nr is the number of rounds corresponding to
key length k bits? The last round is counted though MixColumn is missing.
A. (64, 9) B. (128, 10) C. (192, 11) D. (256, 12) E. None of the above
9. Which relation does an operation D of the diffusion layer of AES always satisfy
for arbitrary inputs A and B? A. D(AB) AB B. D(AB) = AB
C. D(AB) = D(A)D(B) D. D(AB) D(A)D(B) E. None of the above
10. Which attack is applied so that the effective key length of 3-key triple DES is only
112 bits instead of 168 bits? A. Meet-in-the-Middle B. Man-in-the-Middle
C. Differential Attack D. Linear Attack E. None of the above
Part II (3 points each)
Euclidean Algorithm
GCD(72593, 85907) = 13 .
a = 14 and b = 15 is the pair of integers satisfying 47 a + 256 b = 1,
where a is the least positive one.
∗
To show that 2 is a generator (primitive root) of the multiplicative group 𝒁181 , it
suffices to verify 2 1, 2 1, and 2 1, where 0 < u < v < w. We have (u, v, w)
u v w
= ( 16 , 17 , 90).
word8 Alogtable[256] = {
1, 3, 5, 15, 17, 51, 85,255, 26, 46,114,150,161,248, 19, 53, 95,225, 56, 72,
216,115,149,164,247, 2, 6, 10, 30, 34,102,170,229, 52, 92,228, 55, 89,235, 38,
106,190,217,112,144,171,230, 49, 83,245, 4, 12, 20, 60, 68,204, 79,209,104,184,
211,110,178,205, 76,212,103,169,224, 59, 77,215, 98,166,241, 8, 24, 40,120,136,
131,158,185,208,107,189,220,127,129,152,179,206, 73,219,118,154,181,196, 87,249,
16, 48, 80,240, 11, 29, 39,105,187,214, 97,163,254, 25, 43,125,135,146,173,236,
47,113,147,174,233, 32, 96,160,251, 22, 58, 78,210,109,183,194, 93,231, 50, 86,
250, 21, 63, 65,195, 94,226, 61, 71,201, 64,192, 91,237, 44,116,156,191,218,117,
159,186,213,100,172,239, 42,126,130,157,188,223,122,142,137,128,155,182,193, 88,
232, 35,101,175,234, 37,111,177,200, 67,197, 84,252, 31, 33, 99,165,244, 7, 9,
27, 45,119,153,176,203, 70,202, 69,207, 74,222,121,139,134,145,168,227, 62, 66,
198, 81,243, 14, 18, 54, 90,238, 41,123,141,140,143,138,133,148,167,242, 13, 23,
57, 75,221,124,132,151,162,253, 28, 36,108,180,199, 82,246, 1};
/* The tables Logtable and Alogtable are used to perform multiplications in GF(256)
word8 mul(word8 a, word8 b) {
if (a && b) return Alogtable[(Logtable[a] + Logtable[b])%255];
else return 0;
}
31 (3 points) Suppose H is a subgroup of G, prove that two left cosets g1H = g2H
if and only if g11g2 H, where g1, g2 G.
1 2 3 4 5 6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
26 27 28 29 30
31 & 32
Cryptography Midterm Exam 2015/05/05
Solution
1 2 3 4 5 6 7 8 9 10
B A C C A B D E C A
11 12 13 14 15
36 60 x64 x x+1 x5 + 1
21 22 23 24 25
2
A. o(3)=20, B. o(7)=4, C. o(9)=10, D. o(11)=10
8
A. o(x)=5, B. o(x)=20, C. o(x)=10, D. o(x)=16