SlideShare a Scribd company logo
1 of 3
Download to read offline
1Copyright °c 2019 The University of Sydney
The University of Sydney
School of Mathematics and Statistics
Assignment 2
MATH2088/2988: Number Theory and Cryptography Semester 2, 2019
Web Page: http://www.maths.usyd.edu.au/MATH2088/
Like Assignment 1, this assignment is in two parts: a “non-computer part” and a “com-
puter part”. Each part consists of two questions: in the non-computer part, which two
questions you need to do depends on whether you are enrolled in the
mainstream unit MATH2088 or the advanced unit MATH2988; in the computer part, all
students do the same two questions. Each part will be marked out of 10 and is worth
5% of your total mark, so the assignment as a whole is worth 10% of your total mark.
Both parts of the assignment must be submitted through Turnitin on the MATH2088
Canvas page or the MATH2988 Canvas page, as appropriate. Note that there is a separate
Turnitin submission for each part; please make sure you submit the right file to the right
Turnitin submission. To find the submission links on the Canvas page, you firstly click on
“Assignments” link in the menu on the left and then click on “Assignment
2 Non-Computer Part” or “Assignment 2 Computer Part” respectively. You do not need
to submit the two parts at the same time, but the same deadline applies to both of them.
For the non-computer part, your submission can be either typed or a
scan/photo of handwritten answers, but it must be submitted as a single file that
can be viewed in Turnitin: for example, a single PDF or a Word document, but not a
Zip file. Check that your file displays correctly in the Turnitin preview window
before you submit it. Unviewable or illegible submissions will get a mark of 0. For the
computer part, your submission will be a text file which is the record of a MAGMA
session (perhaps edited), and should be given the name “asst2-[sid].txt” where “[sid]” is
your student ID.
As always with Turnitin, a submission is not complete until you see the Digital Re-
ceipt, including the submission ID number and time. You should either print this
Digital Receipt or email it to yourself so that you have a copy, for each of the two
submissions; in the (unlikely) event of database error, this Digital Receipt is the only
acceptable proof of the time of your submissions. It is your responsibility to leave
enough time before the assignment deadline to complete both Turnitin submissions: if
you forget to do a Turnitin submission before the deadline, or fail to complete the
submission, you will get 0 for that part of the assignment even if you can prove that you did
it before the deadline. If you discover a problem with a file you have submitted, you can
submit a new version before the deadline (which will simply replace your previous
submission).
Except for students who have registered with Disability Services or who apply
suc- cessfully for Special Consideration or Special Arrangements (see the Information
Sheet), the due date for this Assignment is Thursday 24 October, 2019, before 11:59pm.
2
Non-computer part: Write or type complete answers to the two questions appropriate to
the level of unit you are enrolled in, showing all working.
1. This question is for students enrolled in the mainstream unit MATH2088 only. Do not
answer this if you are in the advanced unit MATH2988.
(a) Suppose that you are an Elgamal user with public key (107, 2, 15) and
private key 11. Note that this is consistent, because 211
≡ 15 (mod
107). If you receive the ciphertext h3, [79, 34]i, what is the decrypted
message?
(b) Find a primitive root modulo 31. Justify your answer.
2. This question is for all students.
(a) Find an integer x ∈ {0, . . . , 196} which solves the equation
x157
≡ 8 (mod 197).
√
(b) Assume that some algorithm requires more than 22 k
bit operations to com-
pute an answer for a k-bit input. Show that it is not a polynomial time
algorithm.
You may use the result from analysis: for any c > 1 and b > 0,
ck
lim
k→∞ kb
= ∞.
(c) How many iterations of the Pollard Rho method with parameters t0 = 1 and
tl+1 ≡ t2
l+ 1 (mod n) are needed to find a factor 151 of n?
3. This question is for students enrolled in the advanced unit MATH2988 only. Do
not answer this if you are in the mainstream unit MATH2088.
(a) Let n = pq where p and q are distinct primes. Show that n is not a
Carmichael number. [Hint: consider a primitive root modulo the
bigger prime factor of n]
(b) Let k ∈ Z+
and n be a k-bit integer number, such that n ≡ 1 (mod 5). Show that
there exists an integer m such that m2
− n is divisible by 5k
. Provide a
polynomial time algorithm which computes m.
Note: You need to show that your algorithm always gives a correct answer
and explain why it is polynomial time. You do not have to provide a rigorous
computer code for it, “human” description will suffice. (However, if you are
able to write MAGMA code for the algorithm, you could of course then
test actual large numbers to see whether it works and whether the
growth rate of the time appears to be as expected.) Also, you do not have to
produce as quick algorithm as possible. Any polynomial time algorithm
will suffice.
3
Computer part: This is to be done using MAGMA, either in the computer labs (the
lab session in Week 12 has been set aside for this purpose) or on your own
computer if you have successfully installed MAGMA there (see the instructions on the
unit web page). If you are completing Q5 outside the computer labs, you will need to
download the file asst2definitions.txt from the Resources Table on the web page.
What you need to submit is a “log file” or record of your MAGMA session; to
get MAGMA to generate this automatically and give it the right name, you can make your
first command SetLogFile("asst2-[sid].txt"); where [sid] is replaced by your student ID.
You could answer the two questions in different MAGMA sessions, but in that case you
would have to concatenate the log files (e.g. using a text editor) so that you have a single text
file to submit to Turnitin. In case of problems with the SetLogFile command, you can
alternatively create the text file yourself by copying and pasting from your MAGMA
session into a text editor.
As well as the MAGMA commands, you may wish to add comments such as “Question
4” or “This is my answer”: you can start and end comments by typing /* and */.
If you complete the assignment in the labs, you could (probably) do the
Turnitin submission there too, but in any case please email yourself a copy of your log
file(s).
4. In MAGMA define p to be the smallest prime which is greater than or equal to
your student ID and is also congruent to 1 modulo 4. Ask MAGMA to
choose a primitive root b modulo p with the command b:=PrimitiveRoot(p);.
Then use appropriate MAGMA commands to find a nonnegative integer less than p
which is a square root of −1 modulo p. There are two such integers; you can stop once
you have found one of them, except that you should then get MAGMA to check
that your answer does square to something congruent to −1 modulo p.
5. Load the file asst2definitions.txt. It defines an RSA public key (n,e) and a cipher-
text ct which has been encrypted using this public key; ct is a sequence of residues
modulo n, which happens to consist of just a single residue. (To avoid antagonizing
Turnitin, it is best not to print n, e or ct in your MAGMA session. If you want to see
them, look in the file asst2definitions.txt.)
Before encryption, the original message (four words in ordinary Roman
letters) was encoded as a residue modulo n using the NaiveEncoding function
in the file MagmaProcedures.txt. Your task is to find this original message by
decrypting ct as in Computer Tutorial 6, for which you will first need to find the
decryption exponent d, the inverse of e modulo φ(n).
The problem is that n has 1250 decimal digits, which is far too large to use the
MAGMA commands Factorization(n); or EulerPhi(n); (don’t bother trying
them; MAGMA will just hang or run out of time). This RSA cryptosystem
would be unbreakable, except that someone has let slip the information that the
two primes of which n is the product are a Germain prime x and its
corresponding safe prime 2x + 1. Knowing this, you can find x as the unique
positive solution of the quadratic equation 2x2
+ x − n = 0. To apply the quadratic
formula, you will need to find the square root of the discriminant D as an
exact integer: Q4 of Computer Tutorial 8 explains how to do this.

More Related Content

What's hot

Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...Mahbubur Rahman
 
Definition of automation,finite automata,transition system
Definition of automation,finite automata,transition systemDefinition of automation,finite automata,transition system
Definition of automation,finite automata,transition systemDr. ABHISHEK K PANDEY
 
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetPerspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetHoang Nguyen Phong
 
Find Transitive Closure Using Floyd-Warshall Algorithm
Find Transitive Closure Using Floyd-Warshall AlgorithmFind Transitive Closure Using Floyd-Warshall Algorithm
Find Transitive Closure Using Floyd-Warshall AlgorithmRajib Roy
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05Wayne Jones Jnr
 
Unit 3 - Greedy Method
Unit 3  - Greedy MethodUnit 3  - Greedy Method
Unit 3 - Greedy MethodMaryJacob24
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Operator Precedence Grammar
Operator Precedence GrammarOperator Precedence Grammar
Operator Precedence GrammarHarisonFekadu
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.pptssuser702532
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and SchedulingHeman Pathak
 

What's hot (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
Constraint Satisfaction Problem (CSP) : Cryptarithmetic, Graph Coloring, 4- Q...
 
Definition of automation,finite automata,transition system
Definition of automation,finite automata,transition systemDefinition of automation,finite automata,transition system
Definition of automation,finite automata,transition system
 
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetPerspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
 
Find Transitive Closure Using Floyd-Warshall Algorithm
Find Transitive Closure Using Floyd-Warshall AlgorithmFind Transitive Closure Using Floyd-Warshall Algorithm
Find Transitive Closure Using Floyd-Warshall Algorithm
 
Computer network
Computer networkComputer network
Computer network
 
9707 s14 ms_32
9707 s14 ms_329707 s14 ms_32
9707 s14 ms_32
 
Primality
PrimalityPrimality
Primality
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Unit 3 - Greedy Method
Unit 3  - Greedy MethodUnit 3  - Greedy Method
Unit 3 - Greedy Method
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Operator Precedence Grammar
Operator Precedence GrammarOperator Precedence Grammar
Operator Precedence Grammar
 
5. cs8451 daa anna univ question bank unit 5
5. cs8451 daa anna univ question bank unit 55. cs8451 daa anna univ question bank unit 5
5. cs8451 daa anna univ question bank unit 5
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Ch04
Ch04Ch04
Ch04
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and Scheduling
 

Similar to MATH2088/2988 Number Theory and Cryptography Assignments

databasehomeworkhelp.com_ Database System Assignment Help (1).pptx
databasehomeworkhelp.com_ Database System Assignment Help (1).pptxdatabasehomeworkhelp.com_ Database System Assignment Help (1).pptx
databasehomeworkhelp.com_ Database System Assignment Help (1).pptxDatabase Homework Help
 
matmultHomework3.pdfNames of Files to Submit matmult..docx
matmultHomework3.pdfNames of Files to Submit  matmult..docxmatmultHomework3.pdfNames of Files to Submit  matmult..docx
matmultHomework3.pdfNames of Files to Submit matmult..docxandreecapon
 
Week1 programming challenges
Week1 programming challengesWeek1 programming challenges
Week1 programming challengesDhanu Srikar
 
Ecs 10 programming assignment 4 loopapalooza
Ecs 10 programming assignment 4   loopapaloozaEcs 10 programming assignment 4   loopapalooza
Ecs 10 programming assignment 4 loopapaloozaJenniferBall44
 
educational course/tutorialoutlet.com
educational course/tutorialoutlet.comeducational course/tutorialoutlet.com
educational course/tutorialoutlet.comjorge0043
 
complexity analysis.pdf
complexity analysis.pdfcomplexity analysis.pdf
complexity analysis.pdfpasinduneshan
 
UNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.pptUNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.pptracha49
 
Introduction to Design Algorithm And Analysis.ppt
Introduction to Design Algorithm And Analysis.pptIntroduction to Design Algorithm And Analysis.ppt
Introduction to Design Algorithm And Analysis.pptBhargaviDalal4
 
CP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsCP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsSheba41
 

Similar to MATH2088/2988 Number Theory and Cryptography Assignments (20)

databasehomeworkhelp.com_ Database System Assignment Help (1).pptx
databasehomeworkhelp.com_ Database System Assignment Help (1).pptxdatabasehomeworkhelp.com_ Database System Assignment Help (1).pptx
databasehomeworkhelp.com_ Database System Assignment Help (1).pptx
 
matmultHomework3.pdfNames of Files to Submit matmult..docx
matmultHomework3.pdfNames of Files to Submit  matmult..docxmatmultHomework3.pdfNames of Files to Submit  matmult..docx
matmultHomework3.pdfNames of Files to Submit matmult..docx
 
Week1 programming challenges
Week1 programming challengesWeek1 programming challenges
Week1 programming challenges
 
DATA STRUCTURE.pdf
DATA STRUCTURE.pdfDATA STRUCTURE.pdf
DATA STRUCTURE.pdf
 
DATA STRUCTURE
DATA STRUCTUREDATA STRUCTURE
DATA STRUCTURE
 
Matopt
MatoptMatopt
Matopt
 
Daa notes 1
Daa notes 1Daa notes 1
Daa notes 1
 
CS4961-L9.ppt
CS4961-L9.pptCS4961-L9.ppt
CS4961-L9.ppt
 
Ecs 10 programming assignment 4 loopapalooza
Ecs 10 programming assignment 4   loopapaloozaEcs 10 programming assignment 4   loopapalooza
Ecs 10 programming assignment 4 loopapalooza
 
Code Tuning
Code TuningCode Tuning
Code Tuning
 
educational course/tutorialoutlet.com
educational course/tutorialoutlet.comeducational course/tutorialoutlet.com
educational course/tutorialoutlet.com
 
complexity analysis.pdf
complexity analysis.pdfcomplexity analysis.pdf
complexity analysis.pdf
 
Grounded Pointers
Grounded PointersGrounded Pointers
Grounded Pointers
 
UNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.pptUNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.ppt
 
UNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.pptUNIT-1-PPTS-DAA.ppt
UNIT-1-PPTS-DAA.ppt
 
Introduction to Design Algorithm And Analysis.ppt
Introduction to Design Algorithm And Analysis.pptIntroduction to Design Algorithm And Analysis.ppt
Introduction to Design Algorithm And Analysis.ppt
 
CP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithmsCP4151 Advanced data structures and algorithms
CP4151 Advanced data structures and algorithms
 
A01
A01A01
A01
 
Daa chapter 1
Daa chapter 1Daa chapter 1
Daa chapter 1
 
ALGO.ppt
ALGO.pptALGO.ppt
ALGO.ppt
 

More from Johnsmith5188

Corporate law-law2001
Corporate law-law2001Corporate law-law2001
Corporate law-law2001Johnsmith5188
 
Information for-prioritising-brand-decisions
Information for-prioritising-brand-decisionsInformation for-prioritising-brand-decisions
Information for-prioritising-brand-decisionsJohnsmith5188
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp ukJohnsmith5188
 
Finance Assignment Help by EssayCorp Experts in Australia
Finance Assignment Help  by EssayCorp Experts in AustraliaFinance Assignment Help  by EssayCorp Experts in Australia
Finance Assignment Help by EssayCorp Experts in AustraliaJohnsmith5188
 
NIT1201 Introduction to Database System Assignment by USA Experts
NIT1201 Introduction to Database System Assignment by USA ExpertsNIT1201 Introduction to Database System Assignment by USA Experts
NIT1201 Introduction to Database System Assignment by USA ExpertsJohnsmith5188
 
Responsibility of the Nurse
Responsibility of the NurseResponsibility of the Nurse
Responsibility of the NurseJohnsmith5188
 
Financial modeling & coding
Financial modeling  & coding Financial modeling  & coding
Financial modeling & coding Johnsmith5188
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsJohnsmith5188
 

More from Johnsmith5188 (9)

Corporate law-law2001
Corporate law-law2001Corporate law-law2001
Corporate law-law2001
 
Information for-prioritising-brand-decisions
Information for-prioritising-brand-decisionsInformation for-prioritising-brand-decisions
Information for-prioritising-brand-decisions
 
Article analysis
Article analysisArticle analysis
Article analysis
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp uk
 
Finance Assignment Help by EssayCorp Experts in Australia
Finance Assignment Help  by EssayCorp Experts in AustraliaFinance Assignment Help  by EssayCorp Experts in Australia
Finance Assignment Help by EssayCorp Experts in Australia
 
NIT1201 Introduction to Database System Assignment by USA Experts
NIT1201 Introduction to Database System Assignment by USA ExpertsNIT1201 Introduction to Database System Assignment by USA Experts
NIT1201 Introduction to Database System Assignment by USA Experts
 
Responsibility of the Nurse
Responsibility of the NurseResponsibility of the Nurse
Responsibility of the Nurse
 
Financial modeling & coding
Financial modeling  & coding Financial modeling  & coding
Financial modeling & coding
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology Assignments
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

MATH2088/2988 Number Theory and Cryptography Assignments

  • 1. 1Copyright °c 2019 The University of Sydney The University of Sydney School of Mathematics and Statistics Assignment 2 MATH2088/2988: Number Theory and Cryptography Semester 2, 2019 Web Page: http://www.maths.usyd.edu.au/MATH2088/ Like Assignment 1, this assignment is in two parts: a “non-computer part” and a “com- puter part”. Each part consists of two questions: in the non-computer part, which two questions you need to do depends on whether you are enrolled in the mainstream unit MATH2088 or the advanced unit MATH2988; in the computer part, all students do the same two questions. Each part will be marked out of 10 and is worth 5% of your total mark, so the assignment as a whole is worth 10% of your total mark. Both parts of the assignment must be submitted through Turnitin on the MATH2088 Canvas page or the MATH2988 Canvas page, as appropriate. Note that there is a separate Turnitin submission for each part; please make sure you submit the right file to the right Turnitin submission. To find the submission links on the Canvas page, you firstly click on “Assignments” link in the menu on the left and then click on “Assignment 2 Non-Computer Part” or “Assignment 2 Computer Part” respectively. You do not need to submit the two parts at the same time, but the same deadline applies to both of them. For the non-computer part, your submission can be either typed or a scan/photo of handwritten answers, but it must be submitted as a single file that can be viewed in Turnitin: for example, a single PDF or a Word document, but not a Zip file. Check that your file displays correctly in the Turnitin preview window before you submit it. Unviewable or illegible submissions will get a mark of 0. For the computer part, your submission will be a text file which is the record of a MAGMA session (perhaps edited), and should be given the name “asst2-[sid].txt” where “[sid]” is your student ID. As always with Turnitin, a submission is not complete until you see the Digital Re- ceipt, including the submission ID number and time. You should either print this Digital Receipt or email it to yourself so that you have a copy, for each of the two submissions; in the (unlikely) event of database error, this Digital Receipt is the only acceptable proof of the time of your submissions. It is your responsibility to leave enough time before the assignment deadline to complete both Turnitin submissions: if you forget to do a Turnitin submission before the deadline, or fail to complete the submission, you will get 0 for that part of the assignment even if you can prove that you did it before the deadline. If you discover a problem with a file you have submitted, you can submit a new version before the deadline (which will simply replace your previous submission). Except for students who have registered with Disability Services or who apply suc- cessfully for Special Consideration or Special Arrangements (see the Information Sheet), the due date for this Assignment is Thursday 24 October, 2019, before 11:59pm.
  • 2. 2 Non-computer part: Write or type complete answers to the two questions appropriate to the level of unit you are enrolled in, showing all working. 1. This question is for students enrolled in the mainstream unit MATH2088 only. Do not answer this if you are in the advanced unit MATH2988. (a) Suppose that you are an Elgamal user with public key (107, 2, 15) and private key 11. Note that this is consistent, because 211 ≡ 15 (mod 107). If you receive the ciphertext h3, [79, 34]i, what is the decrypted message? (b) Find a primitive root modulo 31. Justify your answer. 2. This question is for all students. (a) Find an integer x ∈ {0, . . . , 196} which solves the equation x157 ≡ 8 (mod 197). √ (b) Assume that some algorithm requires more than 22 k bit operations to com- pute an answer for a k-bit input. Show that it is not a polynomial time algorithm. You may use the result from analysis: for any c > 1 and b > 0, ck lim k→∞ kb = ∞. (c) How many iterations of the Pollard Rho method with parameters t0 = 1 and tl+1 ≡ t2 l+ 1 (mod n) are needed to find a factor 151 of n? 3. This question is for students enrolled in the advanced unit MATH2988 only. Do not answer this if you are in the mainstream unit MATH2088. (a) Let n = pq where p and q are distinct primes. Show that n is not a Carmichael number. [Hint: consider a primitive root modulo the bigger prime factor of n] (b) Let k ∈ Z+ and n be a k-bit integer number, such that n ≡ 1 (mod 5). Show that there exists an integer m such that m2 − n is divisible by 5k . Provide a polynomial time algorithm which computes m. Note: You need to show that your algorithm always gives a correct answer and explain why it is polynomial time. You do not have to provide a rigorous computer code for it, “human” description will suffice. (However, if you are able to write MAGMA code for the algorithm, you could of course then test actual large numbers to see whether it works and whether the growth rate of the time appears to be as expected.) Also, you do not have to produce as quick algorithm as possible. Any polynomial time algorithm will suffice.
  • 3. 3 Computer part: This is to be done using MAGMA, either in the computer labs (the lab session in Week 12 has been set aside for this purpose) or on your own computer if you have successfully installed MAGMA there (see the instructions on the unit web page). If you are completing Q5 outside the computer labs, you will need to download the file asst2definitions.txt from the Resources Table on the web page. What you need to submit is a “log file” or record of your MAGMA session; to get MAGMA to generate this automatically and give it the right name, you can make your first command SetLogFile("asst2-[sid].txt"); where [sid] is replaced by your student ID. You could answer the two questions in different MAGMA sessions, but in that case you would have to concatenate the log files (e.g. using a text editor) so that you have a single text file to submit to Turnitin. In case of problems with the SetLogFile command, you can alternatively create the text file yourself by copying and pasting from your MAGMA session into a text editor. As well as the MAGMA commands, you may wish to add comments such as “Question 4” or “This is my answer”: you can start and end comments by typing /* and */. If you complete the assignment in the labs, you could (probably) do the Turnitin submission there too, but in any case please email yourself a copy of your log file(s). 4. In MAGMA define p to be the smallest prime which is greater than or equal to your student ID and is also congruent to 1 modulo 4. Ask MAGMA to choose a primitive root b modulo p with the command b:=PrimitiveRoot(p);. Then use appropriate MAGMA commands to find a nonnegative integer less than p which is a square root of −1 modulo p. There are two such integers; you can stop once you have found one of them, except that you should then get MAGMA to check that your answer does square to something congruent to −1 modulo p. 5. Load the file asst2definitions.txt. It defines an RSA public key (n,e) and a cipher- text ct which has been encrypted using this public key; ct is a sequence of residues modulo n, which happens to consist of just a single residue. (To avoid antagonizing Turnitin, it is best not to print n, e or ct in your MAGMA session. If you want to see them, look in the file asst2definitions.txt.) Before encryption, the original message (four words in ordinary Roman letters) was encoded as a residue modulo n using the NaiveEncoding function in the file MagmaProcedures.txt. Your task is to find this original message by decrypting ct as in Computer Tutorial 6, for which you will first need to find the decryption exponent d, the inverse of e modulo φ(n). The problem is that n has 1250 decimal digits, which is far too large to use the MAGMA commands Factorization(n); or EulerPhi(n); (don’t bother trying them; MAGMA will just hang or run out of time). This RSA cryptosystem would be unbreakable, except that someone has let slip the information that the two primes of which n is the product are a Germain prime x and its corresponding safe prime 2x + 1. Knowing this, you can find x as the unique positive solution of the quadratic equation 2x2 + x − n = 0. To apply the quadratic formula, you will need to find the square root of the discriminant D as an exact integer: Q4 of Computer Tutorial 8 explains how to do this.