Assignment 8
Problem 1
Suppose I
want to send you a secret message. We agree to convert the message to a
sequence of numbers by the correspondence A<->30, B<->29, C<->28,
..., Y<->6, Z<->5 (ignore spaces and punctuation marks). I am then
to send you the sequence of coded numbers. You announce the public
key (35, 29), but keep the secret private key (35, 5) to yourself. Using
the public key, I code my message and send you the coded sequence
29, 31, 17, 05, 13, 31, 16, 11, 17, 16, 05, 27, 06, 23, 25, 16, 18
What is the message?
Problem 2
Gettysburg Gadgets uses e-mail to communicate with its suppliers. Unfortunately,
competitors have been reading the e-mail messages in transit and using
the information to sell similar products at a lower cost. A computer security
expert is hired to work out a secure means of communication.
Gettysburg Gadgets and its suppliers are assigned private and public
keys, and the suppliers are also assigned unique identification numbers.
The public keys are stored in a public-key repository on the Internet,
and Gettysburg Gadgets is given a list of the suppliers' identification
numbers and private keys.
Whenever Gettysburg Gadgets and a supplier communicate, they observe
the following procedure:
-
The supplier encrypts its identification number using Gettysburg Gadgets'
public key and sends the message to Gettysburg Gadgets.
-
Gettysburg Gadgets decrypts the message using its private key and then
uses the supplier's identification number to look up the supplier's private
key.
-
Gettysburg Gadgets selects a random number as a secret symmetric session
key, encrypts the session key using the supplier's private key, and sends
the message to the supplier.
-
The supplier decrypts the message using its public key and extracts the
private symmetric session key. Since only the supplier and Gettysburg Gadgets
know the supplier's private key, the supplier can verify that Gettysburg
Gadgets actually sent the message.
-
Subsequent messages between Gettysburg Gadgets and the supplier are exchanged
using the secret symmetric session key.
Despite this elaborate protocol, the messages are still being intercepted
successfully.
What's wrong? Be precise!
Groundrules
This is an individual assignment. You may not discuss the problems, the
solutions, or the answers with anyone else.
Be sure to write and sign the full Honor Pledge.
Submission
Your answers must be submitted on the tan sheet of paper handed out in
class.
Due Date and Time
This assignment is due at the beginning of class on Friday, April 20. Late
work will not be accepted.