Cryptography Reference
In-Depth Information
If we extract the sixth and eighth rows, we obtain a matrix with determinant 133 which
is invertible modulo p 1 . By inverting the matrix, we obtain through computations in
Z p 1 that
10918
5240
18146
3187
13929
902
x 1
x 2
x 3
x 4
x 5
x 6
=
which leads to
g 10918
2
=
mod p
g 5240
3
=
mod p
g 18146
5
=
mod p
g 3187
7
=
mod p
g 13929
11
=
mod p
g 902
13
=
mod p
We can finally figure out that
yg 30
2 1
5 1
7 1
13 2
×
×
×
(mod p )
hence
g 30 + 10918 + 18146 + 3187 + 2 × 902
g 34025
y
=
mod p
=
mod p
.
7.5
Exercises
n
1
Exercise 7.1. We call strong prime an odd prime n such that
is prime as well. Prove that we
2
5 ) .
can (heuristically) generate
-bit strong primes within a time complexity of
O
(
Hint: Make the heuristic assumption that m and 2 m
+
1 behave like independent random odd
numbers when m is a random odd number.
Exercise 7.2. Assume we have a table S of n Boolean elements. We consider the five following
algorithms.
Search WWH ::




Custom Search