1. () Given finite field Z17
and two elements
a
= 10 Î Z17
and
b
= 12 Î Z17. Please compute
a
+
b,
a
-
b,
a´b, and
a
/
b.
2. () Given Z7, irreducible polynomial
m(x) =
x
3
+ 3, and two elements
f(x) = 2x
2
+ 1Î GF(73) and
g(x) = 3x+2Î GF(73). Please compute
f(x) +
g(x),
f(x) –
g(x),
f(x) ´g(x), and
f(x) /
g(x).
3. Given matrix M = and column vector C = , consider the affine transformation
f(v) = M×v + C
over Z11where v is2-dimensional column vector.
(1) (10 points) Compute
f(v) for v = .
(2) (Bonus 10 points) The inverse of
f
is also an affine transformation. Compute the matrix and column vector of
f
-1.
4. Given the original AES encryption and decryption:
Consider the variations AES-V1 and AES-V2.
(1) () AES-V1 only has the initial AddRoundKey. Please design an attack against AES-V1. You need to specify the attack objective, type ofattack, and the detailed cryptanalysis.
(2) () AES-V2 only has the initial AddRoundKey and the next one round of encryption (i.e. Round 1). Please design an attack against AES-V2.
5. Problem 6.4 ():With the ECB mode,if there is an error in a block of the transmitted ciphertext,onlythe corresponding plaintext block is affected. However, in the CBC mode, this errorpropagates. For example, an error in the transmittedC
1
(Figure 6.4) obviouslycorrupts
P
1
and
P
2.
(1) Are any blocks beyond
P
2
affected?
(2) Suppose that there is a bit error in the source version of
P
1. Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?
6. Problem 6.10 () In discussing the CTR mode, it was mentioned that if any plaintext block that is encrypted using a given counter value is known, then the output of the encryption function can be determined easily from the associated ciphertext block. Show the calculation.