HW116Dec
HW116Dec
Suppose we have a computer with a 4.2 GHz 16-core processor that executes 4.2 × 109 cycles
per second per core. Considering that it can test a key per CPU cycle:
a) What is the expected time (in years) to find a key by the brute-force attack if the
key size is 56 bits?
b) What is the expected time (in years) to find a key by the brute-force attack if the
key size is 128 bits?
Alice is using the one-time pad and notices that when her key is all-zeroes 𝐾 = 0𝑛 , then
Enc(𝐾, 𝑀) = 𝑀 and her message is sent in the clear! To avoid this problem, she decides to
modify the scheme to exclude the all-zeroes key. That is, the key is now chosen uniformly from
{0, 1}𝑛 \ {0𝑛 }, the set of all 𝑛-bit strings except 0𝑛 . In this way, she guarantees that her plaintext
is never sent in the clear. Is this variant still one-time perfectly secure? Justify your answer.
Question 5 (15 points):
Answer each of the following without using a calculator.
a) 3 − 11 (mod 9) =
b) 15 × 29 (mod 13) =
c) −12 / 35 (mod 19) =
d) Are 172 and 68 co-prime numbers?
The following questions concern multiple encryptions of single-character ASCII plaintexts with
the one-time pad using the same 8-bit key. You may assume that the plaintexts are either (upper-
case or lower-case) English letters or space character. Note that the ASCII code for the space
character is 20 (hex) = 0010 0000 (binary), the ASCII code for ‘A’ is 41 (hex) = 0100 0001
(binary), and the ASCII code for ‘a’ is 61 (hex) = 0110 0001 (binary), as it is clear from the table
below.
a) Say you see the ciphertexts 3D (hex) and 44 (hex). What can you deduce about
the plaintext characters these correspond to?
b) Say you see the three ciphertexts FF (hex), B5 (hex), and C7 (hex). What
can you deduce about the plaintext characters these correspond to?
Question 7 (10 points):
Suppose that, after a particular step of A5/1 stream cipher, the values in the registers are:
X = (x0, x1, … , x18) = (1010101010101010110)
Y = (y0, y1, … , y21) = (1100110001101100010011)
Z = (z0, z1, … , z22) = (11100101110000011000011)
a) List the next 4 keystream bits.
b) Give the contents of X, Y, and Z after the generation of each of these 4 bits.
This question requires you to explore and evaluate the key cryptographic properties of substitution
boxes (S-Boxes) used in symmetric-key cryptography. Focus on the following properties: (1)
Bijection, (2) Nonlinearity, (3) Strict Avalanche Criterion (SAC), and (4) Output Bits
Independence Criterion (BIC). Start by selecting a peer-reviewed research paper that examines
these performance properties of cryptographic S-Boxes, and ensure you reference this paper in
your submission. Clearly define each property in your own words, ensuring accuracy and clarity.
Next, analyze the AES S-Box by measuring these properties, detailing your methodology step by
step, and presenting your results using well-organized tables or graphs. Submit your work in both
soft and hard copy formats.