YALE UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
CPSC 467a: Cryptography and Computer Security | Handout #14 | |
Professor M. J. Fischer | November 17, 2006 | |
Problem Set 6
Due on Thursday, November 30, 2006.
In the problems below, “textbook” refers to Introduction to Cryptography with Coding Theory: Second Edition by Trappe and Washington..
Problem 23: ElGamal Signatures
Textbook, problem 9.6.6.
Problem 25: Simplified Feige-Fiat-Shamir Authentication Protocol
Happy Hacker decides to implement the simplified Feige-Fiat-Shamir authentication protocol presented in section 89 in Lecture Notes 17. Happy doesn’t see why it’s necessary to choose b at random, so he simply alternates bits, choosing first 0, then 1, then 0, then 1, and so forth. Give an algorithm that allows Irma, who does not know Alice’s secret s, to successfully impersonate Alice in 20 successive repetitions of the protocol.
Problem 26: Secret sharing basics
Problem 27: Secret sharing with cheater
Textbook, problem 12.3.8.