Be sure to check back, because this will be updated during the semester.
The Problem Sets are normally due on Thursdays at 11:59 pm. Each group will submit the written work as a single
pdf through onCourse, and you may upload a Mathematica notebook if necessary.
Check the Tentative Daily Syllabus for the schedule of all assignments. Each Problem Set will be posted here at least one week before the due date.
Remember to follow the Guidelines for Problem Sets in writing
up your solutions.
All chapter references are to the text Understanding Cryptography by
Paar and Pelzl.
Chapter 1: 1.2, 1.9, 1.10, 1.14
Chapter 3: 3.12
Note that you'll need to look up an ASCII table to see understand the exact options for the keys. Also see video on onCourse for clarification on the least significant bit.
Chapter 4: 4.5, 4.6, 4.16
For 4.5 and 4.6, do the computations by hand, although you may use Table 4.2 to look up the inverse, and you may use Mathematica to verify your answers.
For 4.16, be sure to check a physical copy of the text (I've had students with a pdf tell me the problem is different).
For Moore's law, use that processing time will double every 18
months.
Chapter 8: 8.2, 8.4(parts 1-3), 8.6, 8.10
Remember that you can use the Mathematica command MultiplicativeOrder[ ]