Jump to content
Nytro

Cryptography Exercises

Recommended Posts

Posted

Cryptography Exercises

Contents

1 source coding 3

2 Caesar Cipher 4

3 Ciphertext-only Attack 5

4 Classification of Cryptosystems-Network Nodes 6

5 Properties of modulo Operation 10

6 Vernam Cipher 11

7 Public-Key Algorithms 14

8 Double Encryption 15

9 Vigenere Cipher and Transposition 16

10 Permutation Cipher 20

11 Substitution Cipher 21

12 Substitution + Transposition 25

13 Affine Cipher 27

14 Perfect Secrecy 28

15 Feistel Cipher 38

16 Block Cipher 45

17 Digital Encryption Standard (DES) 46

18 Primitive Element 53

19 Diffie-Hellman Key Exchange 54

20 Pohlig-Hellman a-symmetric Encryption 58

21 ElGamal 59

22 RSA System 61

23 Euclid’s algorithm 65

24 Protocol Failure 66

25 Complexity 67

26 Authentication 68

27 Protocols 71

28 Hash Functions 73

29 Cipher Modes 78

30 Pseudo Random Number Generators 79

31 Linear Feedback Shift Register 80

32 Challenge Response 87

33 Application of error correcting codes in biometric authentication 89

34 General Problems 91

Download: http://www.iem.uni-due.de/~vinck/crypto/problems-crypto.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...