midsem.css
midsem.css
Time: 2 hours
Marks: 10×8 = 80 marks
1. Alice and Bob wish to resolve a dispute over telephone. We can encode the
possibilities of the dispute by a binary value. For this they engage a protocol:
(a) Alice → Bob: Alice picks up randomly an x, which is a 200 bit number
and computes the function f (x). Alice sends f (x) to Bob.
(b) Bob → Alice: Bob tells Alice whether x was even or odd.
(c) Alice → Bob: Alice then sends x to Bob, so that Bob can verify whether
his guess was correct.
If Bob’s guess was right, Bob wins. Otherwise Alice has the dispute solved in
her own way. They decide upon the following function, f : X → Y , where X
is a random variable denoting a 200 bit sequence and Y is a random variable
denoting a 100 bit sequence.
The function f is defined as follows:
f (x) = ( the most significant 100 bits of x) ∨ (the least significant 100 bits of x),
∀x ∈ X
4. Show that the unicity distance of the Hill Cipher over Z26 (with an m × m
encryption matrix) is less than m/RL , where RL is the redundancy of the
language.
5. Suppose S1 is the Shift Cipher (with equiprobable keys) and S2 is the Shift
Cipher where keys are chosen with respect to some probability distribution PK
(which not be equiprobable). Prove that S1 × S2 = S1 .
6. Let DES(x, K) represent the encryption of plaintext x with key K using the
DES cryptosystem. Suppose DES(x, K) and y 0 = DES(c(x), c(K)), where
c(.) denotes the bitwise complement of its argument. Prove that y 0 = c(y).
That is if we complement the plaintext and the key in DES, then the ciphertext
also gets complemented.
Note: This can be proved by the high level description of DES, the actual
structure of S-Boxes or other component functions are irrelevant to this result.