1. () Given finite field Z17 and two elements a = 10 Î Z17 and b = 12 Î Z17. Please compute
a + b, a - b, a´b, and a / b.
2. () Given Z7, irreducible polynomial m(x) = x3 + 3, and two elements f(x) = 2x2 + 1Î GF(73) and g(x) = 3x+2Î GF(73). Please compute
f(x) + g(x), f(x) – g(x), f(x) ´g(x), and f(x) / g(x).
3. Given matrix M = and column vector C = , consider the affine transformation
f(v) = M×v + C
over Z11where v is2-dimensional column vector.
XXXXXXXXXXpoints) Compute f(v) for v = .
(2) (Bonus 10 points) The inverse of f is also an affine transformation. Compute the matrix and column vector of f-1.
4. Given the original AES encryption and decryption:
Consider the variations AES-V1 and AES-V2.
XXXXXXXXXXAES-V1 only has the initial AddRoundKey. Please design an attack against AES-V1. You need to specify the attack objective, type ofattack, and the detailed cryptanalysis.
XXXXXXXXXXAES-V2 only has the initial AddRoundKey and the next one round of encryption (i.e. Round 1). Please design an attack against AES-V2.
5. Problem 6.4 ():With the ECB mode,if there is an error in a block of the transmitted ciphertext,onlythe corresponding plaintext block is affected. However, in the CBC mode, this errorpropagates. For example, an error in the transmittedC1 (Figure 6.4) obviouslycorrupts P1 and P2.
(1) Are any blocks beyond P2 affected?
(2) Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?
6. Problem XXXXXXXXXXIn discussing the CTR mode, it was mentioned that if any plaintext block that is encrypted using a given counter value is known, then the output of the encryption function can be determined easily from the associated ciphertext block. Show the calculation.