 
 
 
 
 
   
William Stein
Date: Math 124  HARVARD UNIVERSITY
 HARVARD UNIVERSITY  Fall 2001
 Fall 2001
 and
 and
 .  Nikita secretely chooses a number
.  Nikita secretely chooses a number  and tells you
that
 and tells you
that 
 .  You choose the random number
.  You choose the random number 
 .  Tell me what the secret key is!
.  Tell me what the secret key is!
VE RI TAS, where we view this string as a number in 
base  using the encoding of Section 2 of Lecture 9.  
(Note that the left-most ``digit'',
 using the encoding of Section 2 of Lecture 9.  
(Note that the left-most ``digit'', V, is the
least significant digit, and   denotes a blank space.)
 ?
?
 and
 and  .  Nikita chooses
a random number
.  Nikita chooses
a random number  and tells Michael that
 and tells Michael that 
 , and
Michael chooses a random number
, and
Michael chooses a random number  and tells Nikita that
 and tells Nikita that 
 .  Crack their code: What is the secret key that Nikita and
Michael agree upon?  What is
.  Crack their code: What is the secret key that Nikita and
Michael agree upon?  What is  ?  What is
?  What is  ?
?
 ,
encrypt the year that you will graduate from Harvard.
,
encrypt the year that you will graduate from Harvard. 
 for the RSA 
cryptosystem with public key
 for the RSA 
cryptosystem with public key 
 ?
?
 encrypts an important question using 
the RSA cryptosystem from part (a).  What is the question?  (After decoding,
you'll get a number.  To find the corresponding word, see Section 2 of
Lecture 9.)
 encrypts an important question using 
the RSA cryptosystem from part (a).  What is the question?  (After decoding,
you'll get a number.  To find the corresponding word, see Section 2 of
Lecture 9.)
 for which the factorization of
 for which the factorization of  cannot be found 
in a reasonable amount of time. Suppose that Nikita sends  
messages to Michael by representing each alphabetic character 
as an integer between 0 and
 cannot be found 
in a reasonable amount of time. Suppose that Nikita sends  
messages to Michael by representing each alphabetic character 
as an integer between 0 and  (
 (A corresponds 
to  ,
, B to  , etc., and a space
, etc., and a space   to 0), 
then encrypts each number separately 
using Michael's RSA cryptosystem.  Is this method secure? 
Explain your answer.
 
 directly using the factor 
function in PARI.
 directly using the factor 
function in PARI.
 .  Show how to use the
probabilistic algorithm of Lecture 10 to use
.  Show how to use the
probabilistic algorithm of Lecture 10 to use  to factor
 to factor  .
.
 and
 and  of
 of  are very close.
Show how to use 
the ``Fermat Factorization'' method of Lecture 10 to factor
 are very close.
Show how to use 
the ``Fermat Factorization'' method of Lecture 10 to factor  .
.
 
 
 
 
