Exam 4: Number Theory and Cryptography
Exam 1: The Foundations: Logic and Proofs200 Questions
Exam 2: Basic Structures: Sets, Functions, Sequences, Sums, Matrices214 Questions
Exam 3: Algorithms52 Questions
Exam 4: Number Theory and Cryptography154 Questions
Exam 5: Induction and Recursion53 Questions
Exam 6: Counting156 Questions
Exam 7: Discrete Probability53 Questions
Exam 8: Advanced Counting Techniques128 Questions
Exam 9: Relations74 Questions
Exam 10: Graphs127 Questions
Exam 11: Trees97 Questions
Exam 12: Boolean Algebra77 Questions
Exam 13: Modeling Computation71 Questions
Select questions type
What is the shared key if Alice and Bob use the Diffie-Hellman key exchange protocol with the prime , the primitive root of , with Alice choosing the secret integer and Bob choosing the secret integer ?
(Short Answer)
4.8/5
(42)
find the sum and product of each of these pairs of numbers. Express your answer as a base 3
expansion.
-
(Short Answer)
4.8/5
(33)
find the sum and product of each of these pairs of numbers. Express your answer as a binary
expansion.
-
(Short Answer)
4.8/5
(33)
Here is a sample proof that contains an error. Explain why the proof is not correct. Theorem: If and , then . Proof: Since .
Since .
Therefore .
Therefore .
(Short Answer)
4.9/5
(28)
Alice has the public key with corresponding private key , and she wants to send the message LAST CALL to her friends so that they know she sent it. What should she send to her friends, assuming she signs the message using the RSA cryptosystem?
(Short Answer)
4.8/5
(34)
Prove or disprove: if p and q are prime numbers, then pq + 1 is prime.
(True/False)
4.8/5
(35)
The cipher text LTDTLLWW was produced by encrypting a plaintext message using the Vigen`ere cipher with
the key TEST. What is the plaintext message?
(Short Answer)
4.8/5
(38)
Showing 41 - 60 of 154
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)