A Classical Introduction to Cryptography Exercise Book

Front Cover
Springer Science & Business Media, 2006 - Computers - 254 pages
0 Reviews
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Contents

PREHISTORY OF CRYPTOGRAPHY
1
Exercise 2 A Simple Substitution Cryptogram
4
Exercise 3 Product of Vigenere Ciphers
5
Exercise 5 Latin Squares
6
Solutions
8
CONVENTIONAL CRYPTOGRAPHY
16
Exercise 4 3DES Exhaustive Search
18
Exercise 6 Exhaustive Search on 3DES
19
Exercise 5 A Special Discrete Logarithm
138
Exercise 7 Cubic Residues
139
Exercise 9 Elliptic Curves and Finite Fields I
140
Exercise 10 Elliptic Curves and Finite Fields II
141
Solutions
142
ALGORITHMIC NUMBER THEORY
159
Exercise 2 Factorization
160
Exercise 3 Prime Numbers
161

Exercise 7 An Extension of DES to 128bit Blocks
20
Exercise 8 Attack Against the OFB Mode
21
Exercise 9 Linear Feedback Shift Registers
22
Exercise 10 Attacks on Cascade Ciphers
23
Exercise 11 Attacks on Encryption Modes I
24
Exercise 12 Attacks on Encryption Modes II
28
Exercise 13 A Variant of A51 I
29
Exercise 14 A Variant of A51 II
31
Exercise 15 Memoryless Exhaustive Search
32
Solutions
34
DEDICATED CONVENTIONAL CRYPTOGRAPHIC PRIMITIVES
57
Exercise 3 Expected Number of Collisions
58
Exercise 5 Weak Hash Function Designs
60
Exercise 6 Collisions on a Modified MD5
62
Exercise 9 MAC from Block Ciphers
63
Exercise 10 CFBMAC
64
Solutions
66
CONVENTIONAL SECURITY ANALYSIS
81
Exercise 3 Differential and Linear Probabilities
82
Exercise 5 Impossible Differentials
84
Exercise 7 Multipermutations
86
Exercise 8 Orthomorphisms
87
Exercise 9 Decorrelation
88
Exercise 10 Decorrelation and Differential Cryptanalysis
89
Exercise 13 Fault Attack against a Block Cipher
94
Solutions
97
SECURITY PROTOCOLS WITH CONVENTIONAL CRYPTOGRAPHY
125
Exercise 2 WooLam Protocol
126
Exercise 3 MicroMint I
127
Exercise 5 Bluetooth Pairing Protocol
128
Solutions
130
ALGORITHMIC ALGEBRA
135
Exercise 4 Finite Fields and AES
137
Exercise 7 Hash Function Based on Arithmetics
164
Solutions
165
ELEMENTS OF COMPLEXITY THEORY
175
Exercise 4 Graph Colorability I
176
Solutions
177
PUBLIC KEY CRYPTOGRAPHY
180
Exercise 2 RSA Cryptosystem
182
Exercise 4 RSA Common Moduli
183
Exercise 6 Repeated RSA Encryption
184
Exercise 9 Paillier Cryptosystem
185
Exercise 10 NaccacheStern Cryptosystem
186
Solutions
188
DIGITAL SIGNATURES
199
Exercise 3 DSS with Unprotected Parameters
200
Exercise 4 OngSchnorrShamir Signature
201
Exercise 6 Ring Signatures
203
Solutions
205
CRYPTOGRAPHIC PROTOCOLS
211
Exercise 2 A Blind Signature Protocol for a Variant of DSA
213
Exercise 3 FiatShamir Signature I
215
Exercise 4 FiatShamir Signature II
216
Exercise 6 Conference Key Distribution System
217
Solutions
220
FROM CRYPTOGRAPHY TO COMMUNICATION SECURITY
231
Exercise 2 SSLTLS Cryptography
233
Exercise 3 Secure Shell SSH
235
Exercise 4 Attack against RC5CBCPAD
236
Exercise 5 Wired Equivalent Privacy WEP
237
Exercise 6 Forging X509 Certificates
238
Solutions
240
References
249
Copyright

Other editions - View all

Common terms and phrases