Skip to main content
Logo image

Exercises 7.4 Exercises

3.

Assuming that monoalphabetic code was used to encode the following secret message, what was the original message?
APHUO EGEHP PEXOV FKEUH CKVUE CHKVE APHUO
EGEHU EXOVL EXDKT VGEFT EHFKE UHCKF TZEXO
VEZDT TVKUE XOVKV ENOHK ZFTEH TEHKQ LEROF
PVEHP PEXOV ERYKP GERYT GVKEG XDRTE RGAGA
What is the significance of this message in the history of cryptography?

4.

What is the total number of possible monoalphabetic cryptosystems? How secure are such cryptosystems?

5.

Prove that a 2Γ—2 matrix A with entries in Z26 is invertible if and only if gcd(det(A),26)=1.

6.

Given the matrix
A=(3423),
use the encryption function f(p)=Ap+b to encode the message CRYPTOLOGY, where b=(2,5)t. What is the decoding function?

7.

Encrypt each of the following RSA messages x so that x is divided into blocks of integers of length 2; that is, if x=142528, encode 14, 25, and 28 separately.
  1. n=3551,E=629,x=31
  2. n=2257,E=47,x=23
  3. n=120979,E=13251,x=142371
  4. n=45629,E=781,x=231561

9.

Decrypt each of the following RSA messages y.
  1. n=3551,D=1997,y=2791
  2. n=5893,D=81,y=34
  3. n=120979,D=27331,y=112135
  4. n=79403,D=671,y=129381

10.

For each of the following encryption keys (n,E) in the RSA cryptosystem, compute D.
  1. (n,E)=(451,231)
  2. (n,E)=(3053,1921)
  3. (n,E)=(37986733,12371)
  4. (n,E)=(16394854313,34578451)

11.

Encrypted messages are often divided into blocks of n letters. A message such as THE WORLD WONDERS WHY might be encrypted as JIW OCFRJ LPOEVYQ IOC but sent as JIW OCF RJL POE VYQ IOC. What are the advantages of using blocks of n letters?

13.

Every person in the class should construct an RSA cryptosystem using primes that are 10 to 15 digits long. Hand in (n,E) and an encoded message. Keep D secret. See if you can break one another’s codes.