E-Book Overview
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book covers a majority of the subjects that make up today's cryptology, including symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, and computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
E-Book Content
A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK
A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK
Thomas Baignkres EPFL, Switzerland
Pascal Junod EPFL, Switzerland
Yi Lu EPFL, Switzerland
Jean Monnerat EPFL, Switzerland
Serge Vaudenay EPFL, Switzerland
- Springer
Thomas Baignbres EPFL - I&C - LASEC Lausanne, Switzerland
Pascal Junod Lausanne, Switzerland
Yi Lu EPFL - I&C - LASEC Lausanne, Switzerland
Jean Monnerat EPFL-I&C-LASEC Lausanne, Switzerland
Serge Vaudenay Lausanne, Switzerland
Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 ISBN- 13: 978-0-387-27934-3
e-ISBN-10: 0-387-28835-X e-ISBN- 13: 978-0-387-28835-2
Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Printed in the United States of America. 9 8 7 6 5 4 3 2 1
SPIN 1151441 1.1 1552901
To Vale'rie and my parents To Mimi and Chloe' To my parents To Susan and my parents To Christine and Emilien
Contents
Foreword
xiii
1. PREHISTORY OF CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6
Mappings, etc. A Simple Substitution Cryptogram Product of Vigenkre Ciphers *One-Time Pad *Latin Squares Enigma
Solutions 2. CONVENTIONAL CRYPTOGRAPHY Exercises Exercise 1 Exercise 2 Exercise 3 Exercise 4 Exercise 5 Exercise 6 Exercise 7 Exercise 8 Exercise 9 Exercise 10 Exercise 11 Exercise 12 Exercise 13
Weak Keys of DES Semi-weak Keys of DES Complementation Property of DES 3DES Exhaustive Search 2DES and Two-Key 3DES *Exhaustive Search on 3DES An Extension of DES to 128-bit Blocks Attack Against the OFB Mode *Linear Feedback Shift Registers *Attacks on Cascade Cip