YALE UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
CPSC 467a: Cryptography and Computer Security | Handout #8 | |
Professor M. J. Fischer | October 18, 2006 | |
Problem Set 4
Due on Thursday, October 26, 2006.
Problem 17: Diffie-Hellman Key Exchange
Alice and Bob use the Diffie-Hellman key exchange protocol (section 58, lecture notes 11) with prime p = 29 and primitive root g = 2. Alice chooses x = 5, Bob chooses y = 3.
Problem 18: ElGamal Cryptosystem
A public key cryptosystem can be built from the ElGamal variant of Diffie-Hellman Key Exchange (section 59, lecture notes 11) together with a symmetric cryptosystem such as AES. Using the same parameters as in problem 17 above, what are Bob’s public and private keys?
Problem 19: Square Roots with Composite Moduli
Problem 20: Computing Square Roots Modulo a Prime
Problem 21: Quadratic Residues
Let p be an odd prime. Let a,b QNRp be quadratic non-residues modulo p. Show that ab is a
quadratic residue modulo p.