Chapter 4: Number Theory and Cryptography
Q31E
Find each of these values.
a)\(\left( {{\rm{ - 133 }}{\bf{mod}}{\rm{ 23}} + {\bf{2}}61{\rm{ }}{\bf{mod}}{\rm{ 23}}} \right){\rm{ }}{\bf{mod}}{\rm{ 23}}\)
b)\(\left( {45{\bf{7}}{\rm{ }}{\bf{mod}}{\rm{ 23}} \cdot 182{\rm{ }}{\bf{mod}}\;23} \right){\rm{ }}{\bf{mod}}{\rm{ 23}}\)
Q31E
Show that a positive integer is divisible by 3 if and only if the sum of its decimal digits is divisible by 3.
Q31SE
Explain why you cannot directly adapt the proof that there
are infinitely many primes (Theorem 3 in Section 4.3) to show that are
infinitely many primes in the arithmetic progression 4 k + 1, k = 1,2 ,
Q32E
Use Euclidean algorithm to find
- \(\gcd \left( {1,\,5} \right)\)
- \(\gcd \left( {100,\,101} \right)\)
- \(\gcd \left( {123,\,277} \right)\)
- \(\gcd \left( {1529,\,14039} \right)\)
- \(\gcd \left( {1529,\,14038} \right)\)
- \(\gcd \left( {11111,\,111111} \right)\)
Q32E
For each of these initial seven digits of an ISSN, determine the check digit (which may be the letter ).
a) 1570-868
b) 1553-734
c) 1089-708
d) 1383-811
Q32E
In Exercises suppose that Alice and Bob have these public keys and corresponding private keys:
First express your answers without carrying out the calculations. Then, using a computational aid, if available, perform the calculation to get the numerical answers.role="math" localid="1668617920431"
Alice wants to send to Bob the message “BUY NOW” so that he knows that she sent it and so that only Bob can read it. What should she send to Bob, assuming she signs the message and then encrypts it using Bob’s public key?
Q32E
32. Show that a positive integer is divisible by 11 if and only if the difference of the sum of its decimal digits in even- numbered positions and the sum of its decimal digits in odd-numbered positions is divisible by 11.
Q32E
Which integers are divisible by 5 but leave a remainderof 1 when divided by 3?
Q32SE
Show that if the smallest prime factor pof the positive
Integer nis larger than , thenis prime or equal to 1.
Q33E
We describe a basic key exchange protocol using private key cryptography upon which more sophisticated protocols for key exchange are based. Encryption within the protocol is done using a private key cryptosystem (such as AES) that is considered secure. The protocol involves three parties, Alice and Bob, who wish to exchange a key, and a trusted third party Cathy. Assume that Alice has a secret key that only she and Cathy know, and Bob has a secret key which only he and Cathy know. The protocol has three steps:
- Alice sends the trusted third party Cathy the message “request a shared key with Bob” encrypted using Alice’s key .
- Cathy sends back to Alice a key , which she generates, encrypted using the key , followed by this same key , encrypted using Bob’s key, .
- Alice sends to Bob the key encrypted using , known only to Bob and to Cathy.
Explain why this protocol allows Alice and Bob to share the secret key , known only to them and to Cathy.