首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
CSIE编程代做、代写C++程序设计
项目预算:
开发周期:
发布时间:
要求地区:
National Taiwan Normal University
CSIE Information Security
Due Date: April 7, 2024, PM 11:59
Assignment
1
Policies:
• Zero tolerance for late submission.
• Please pack all your submissions in one zip file. RAR is not allowed!!
• I only accept PDF. MS Word is not allowed.
• Hand-writing is not allowed.
• Please use Chinese.
1.1 Triple Encryption (10 pts)
In this class, I have shown you why double DES is useless. However, someone argues that an attacker may find one key to simulate three keys. That
is,
Enc(k3, Enc(k2, Enc(k1, x))) = Enc(k
′
, x).
So the attacker may need to brute force k
′
instead of k1, k2, k3. Please
show that the probability is negligible.
1.2 Hybrid Chosen-Plaintext-Attack Construction (10 pts)
Let (E0, D0) be a semantically secure cipher defined over {K0,M, C0} and
(E1, D1) be a CPA secure cipher defined over {K, K0, C1}. Define the following hybrid cipher (E, D) as:
E(k, m) := {k0
R←− K0, c1 ← E1(k, k0), c0 ← E0(k0, m), output (c0, c1)},
D(k,(c0, c1)) := {k0 ← D1(k, c1), m ← D0(c0, k0), output m}.
Prove that (E, D) is CPA secure.
1.3 The malleability of CBC mode (10 pts)
Let c be the CBC encryption of some message m ∈ X l
, where X := 0, 1
n
.
You do not know m. Let △ ∈ X . Show how to modify the ciphertext c to
obtain a new ciphertext c
′
that decrypts to m′
, where m′
[0] = m[0] ⊕ △,
and m′
[i] = m[i] for i = 1, . . . , l. That is, by modifying c appropriately,
you can flip bits of your choice in the first block of the decryption of c,
without affecting any of the other blocks.
1.4 Modular Multiplicative Inverse (10 pts)
Please find the modular multiplicative inverse of the following number.
Please write down how you find it. If you give the answer directly without
the process, you will get zero points.
1. 400 mod 997
2. 472 mod 16651
1.5 Euler’s Theorem and RSA (10 pts)
In this class, I have introduced Euler’s Theorem to you as follows.
Theorem 1.1. For every a and n that are relatively prime, then
a
ϕ(n) ≡ 1(mod n).
However, when we run RSA permutation, m and N = pq may not be
relatively prime. When m and N = pq are not relatively prime, will the
reverse permutation still work? Why or why not?
1.6 Pseudo Prime (10 pts)
In this class, I have told you that in computer science, we often use pseudo
primes instead of real primes. However, when we verify the correctness of
RSA, we always assume that p, q are primes. Is there any conflicts? Of
course not or RSA will not work. Please show that even p, q are pseudo
primes, the correctness of RSA still stands.
Hint: What are pseudo primes?
1-2
Figure 1.1: Elliptic group E23(1, 1).
1.7 Elliptic Curve over Zp (10 pts)
An elliptic curve is defined by an equation in two variables with coefficients.
Elliptic curves are not ellipse. They are named because they are described
by cubic equations, similar to those used for calculating the circumference
of an ellipse. For cryptography, the variables and coefficients are restricted
in a finite field, which results in the definition of a finite abelian group.
For elliptic curves over Zp, we use the following equation to form a
group:
y
2 mod p = (x
3 + ax + b) mod p.
Note that all coefficients and variables are belong to Zp.
For example, given a group Ep where a = 1, b = 1, x = 9, y = 7, p = 23,
we have
7
2 mod 23 = (93 + 9 + 1) mod 23
49 mod 23 = 739 mod 23
3 mod 23 = 3 mod 23
So (9, 7) ∈ Ep. We often use Ep(a, b) to represent the group. All points
are shown in Fig. 1.1. Note that (4a
3+27b
2
) mod p ̸= 0 mod p for avoiding
repeated factors.
How about the operation and the identity? In a elliptic curve group,
the identity is defined at infinity O. The operation is defined as follows:
1. For any point P, P + O = P.
2. If P = (x, y), then −P = (x, −y).
1-3
Figure 1.2: Elliptic group operation.
3. To ”add” (operation) P and Q, draw a straight line P Q and find the
third intersection R with the curve Ep. We define P + Q + R = O.
Therefore, P +Q = −R. Note that the computation should be in Zp.
4. For P + P, use the tangent line instead.
You can see Figure 1.2 for reference.
Please show that given P = (xP , yP ), Q = (xQ, yQ), R = P + Q =
(xR, yr),
xR = (λ
2 − xP − xQ) mod p
yR = (λ(xP − xR) − yP ) mod p
where
λ =
(
yQ − yP
xQ − xP
) mod p, if P ̸= Q
(
3x
2
P + a
2yP
) mod p, if P = Q
1.8 Lab: Secret-Key Encryption (15 pts)
• Lab: https://seedsecuritylabs.org/Labs_20.04/Crypto/Crypto_
Encryption/
You need to submit a detailed lab report, with screenshots, to describe
what you have done and what you have observed. You also need to provide
explanation to the observations that are interesting or surprising. Please
also list the important code snippets followed by explanation. Simply attaching code without any explanation will not receive credits.
1.9 Lab: Padding Oracle Attack (15 pts)
• Lab: https://seedsecuritylabs.org/Labs_20.04/Crypto/Crypto_
Padding_Oracle/
1-4
You need to submit a detailed lab report, with screenshots, to describe
what you have done and what you have observed. You also need to provide
explanation to the observations that are interesting or surprising. Please
also list the important code snippets followed by explanation. Simply attaching code without any explanation will not receive credits.
1-5
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代做ceng0013 design of a pro...
2024-11-13
代做mech4880 refrigeration a...
2024-11-13
代做mcd1350: media studies a...
2024-11-13
代写fint b338f (autumn 2024)...
2024-11-13
代做engd3000 design of tunab...
2024-11-13
代做n1611 financial economet...
2024-11-13
代做econ 2331: economic and ...
2024-11-13
代做cs770/870 assignment 8代...
2024-11-13
代写amath 481/581 autumn qua...
2024-11-13
代做ccc8013 the process of s...
2024-11-13
代写csit040 – modern comput...
2024-11-13
代写econ 2070: introduc2on t...
2024-11-13
代写cct260, project 2 person...
2024-11-13
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!