[Course home page] [Course handouts]
YALE UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
CPSC 467b: Cryptography and Computer Security
 
Professor M. J. Fischer
Handout #2
February 3, 2005

Problem Set 1
Due in class on Thursday, February 10, 2005.

Problem 1:   Cracking the Hill cipher

Suppose we are told that the plaintext
breathtaking
yields the ciphertext
RUPOTENTOIFV
where the Hill cipher is used, but the dimension m is not specified. Determine the encryption matrix. (See lecture notes, week 2, for details on the Hill cipher. Note that letters of the alphabet are encoded by the integers 0... 25, and all arithmetic is performed modulo 26.)

Problem 2:   Decrypting a substitution cipher

The file "ciphertext" in the http://zoo.cs.yale.edu/classes/cs467/2005s/course/assignments/ps1/ subdirectory contains encrypted text using a substitution cipher. The set of valid characters is ASCII characters 32 …126. Characters outside of this range (e.g., newline) are left unchanged. Decipher the message. Briefly describe the method that you used. (You will probably want to write some code to help you 1.)

Problem 3:   Entropy, redundancy, and its use in enabling cryptanalysis

Textbook, exercise 3.11.
[Use the definition of redundancy given in the textbook rather than the slightly different version given in the notes.]

Problem 4:   DES

Consider a DES-like scheme where Decrypt 10100101 using K = 1101.

Footnotes:

1For your reference, the key generation program and the enciphering program are in perm_gen.cc and subciph.cc, resp.
2For the computation of fi(x) you should interpret the bit strings x and K as integers written in binary. The output of fi(x) is expressed in binary as well.


File translated from TEX by TTH, version 3.66.
On 22 Feb 2005, 19:15.