MA 479 / CSSE 479: Cryptography
Homework 3 problems inspired by Mathematics
Rose-Hulman Institute of Technology
A joint effort of the
Department of Mathematics
and the Department of Computer Science & Software Engineering
Spring term, 2003-2004
All these problems are paper-and-pencil problems. Please do not use a
(digital) computer when doing these problems. Calculators are okay.
You may turn these problems in electronically to the drop boxes or on
paper. If you do your problems electronically, please use a proper
equation editor rather than trying to fake the mathematical symbols!
Drop box submissions are due at midnight on the due date. Paper
submissions are due in class or in the box outside my office by 5:00 p.m.
Show your work on all problems.
I will give some partial credit, especially on multi-part problems.
- [2 points.] Give an example of an S-box that you could use
with S-DES that has the following properties: 1) You could encrypt and
decrypt with it, i.e. the operation of S-DES would remain reversible,
but 2) the operation of S-DES would not be cryptographically secure.
Explain carefully how you could attack your S-box and/or what important
functions of an S-box are not present in your S-box. (You may use the
same S-box for S0 and S1 if you want.)
- [2 points.] Repeat the previous exercise with another S-box which
is different in some non-trivial way. (If you are not sure if
your new S-box is non-trivially different, please ask.)
- [2 points.] Consider the differential cryptanalysis of one-round
S-DES. Suppose that each plaintext-ciphertext pair gives you 4
possible values of the left half of K1. (This is not
really true; see the next problem.) What is the maximum number of
plaintext-ciphertext pairs that you could try without narrowing down
the left half of the key to exactly one choice? You may assume that
two different plaintext-ciphertext pairs will not give you exactly the
same set of 4 possible values. (This is not really true either.)
Hint: Notice that the correct key will be contained in every
possible set of values, so you can disregard it. The question
therefore boils down to how many three-element sets can you choose so
that the intersection of all of the sets has at least one element (the
incorrect key which you cannot yet eliminate).
- [2 points.] Consider the previous problem again, but now
consider the right half of K1. Now some
plaintext-ciphertext pairs give you 3 or 5 possible half-keys, instead
of 4. What is the maximum number of plaintext-ciphertext pairs that
you could try without narrowing down the right half of the key to
exactly one choice? You may need to figure out how many pairs result
in 3 possible values, how many result in 4, and how many result in 5.
The following problems are from the worksheet from class
entitled "Differential Cryptanalysis, An Exercise".
- [3 points.] Answer question 5 of the worksheet. You will
probably want to consider the previous two problems.
- [3 points.] Carefully write up your answers to questions 1-4
and 6 of the worksheet. (You did this in class.)
- [2 points.] Answer questions 8-10 of the worksheet.
- [6 points.] Answer questions 11-12 of the worksheet.
- [6 points.] Answer question 13 of the worksheet.
The following problems are from Chapter 3 of your textbook.
-
[2 points.] Problem 3.1. Explain your answer carefully.
-
[2 points.] Problem 3.5. You will want to use a result from your DISCO
class on fixed points of permutations.
-
[2 points.] Problem 3.9. Be complete.
-
[2 points.] Problem 3.10.
- [2 points.] Problem 3.12.
- [4 points.] Problem 3.13. (Hint for part (b): show that a chosen
plaintext attack can do a little better than looking at all 256 keys.)
- [4 points.] Problems 3.15 and 3.16.