Tutorial-VII (Symmetric Ciphers & Revision)

1.

  • (i) Use an affine cipher to encrypt the message “hello” with the key pair (7, 2).
  • (ii) Use the affine cipher to decrypt the message “ZEBBW” with the key pair (7, 2) in modulus 26. (i) Encrypt “hello” (h=7, e=4, l=11, o=14) with key (a=7, b=2) mod 26. Encryption: .
    • Ciphertext: ZEBBW
    (ii) Decrypt “ZEBBW” (Z=25, E=4, B=1, W=22) with key (a=7, b=2) mod 26. Find . , so . Decryption: .
    • Plaintext: hello

2. Using the Rabin cryptosystem with and :

  • (i) Encrypt to find the ciphertext.
  • (ii) Use the Chinese remainder theorem to find four possible plaintexts. Given: , , . Public key .

(i) Encryption: Ciphertext . Ciphertext .

(ii) Decryption: We need to find the square roots of modulo . This involves solving modulo and modulo .

  1. Solve : . So . We know , so is a solution. The other solution is . Solutions mod 47: .

  2. Solve : . So . We know , and . So is a solution. The other solution is . Solutions mod 11: .

  3. Combine using Chinese Remainder Theorem (CRT): We need to solve four systems of congruences:

    • ,
    • ,
    • ,
    • ,

    Using CRT: . Find inverses: (since ). (since ).

    Solutions :

    • Case 1: .
    • Case 2: .
    • Case 3: .
    • Case 4: .

The four possible plaintexts are .


3. In the elliptic curve over the field: (Revision Problem)

  • (i) Find all points on the curve and make a figure.
  • (ii) Generate public and private keys for Bob.
  • (iii) Choose a point on the curve as a plaintext for Alice.
  • (iv) Create ciphertext corresponding to the plaintext in part d for Alice. (Note: This likely refers to part (iii))
  • (v) Decrypt the ciphertext for Bob to find the plaintext sent by Alice.