Cryptography Reference
In-Depth Information
9.13. Suppose that a smart card (see Section 9.3), uses the RSA cipher with
public encryption exponent e = 3. Next assume that m is Alice's credit
card number and she buys merchandise from three shops whose public
moduli are n 1 , n 2 , and n 3 , respectively. Thus, each shop computes
m 3 (mod n j ) for j =1 , 2 , 3 ,
respectively. If Mallory has been observing these transactions, how can
he recover m ?
( Hint: See page 178. )
9.14. Cite some problems that might occur with the use of voice as a biometric
identifier. (See Section 9.4.)
9.15. Compare fingerprint and iris scanning as biometric identifiers from the
perspective of which is more accurate and least open to replication. (See
Section 9.4.)
9.16. Given the quantum schemes described on page 369, translate the follow-
ing into binary integers:
↑→→
;
↑→→
;
→→→
;
→↑
;
↑→→↑↑
;
;
↑↑→→
.
9.17. Translate the binary integers found in Exercise 9.16 into decimal digits
and convert to plaintext via Table 1.3 on page 11.
9.18. Suppose that in the nuclear test ban treaty compliance, presented in
Section 9.6, Monty selects p , q , e . Then he downloads n = pq and e
into HAL, and gives n and d to Hostvania. Demonstrate how Monty can
now produce undetectable forgeries. Moreover, in this scenario show how
Hostvania can break the treaty and blame Monty.
G.10 Chapter 10 Exercises
10.1. Name ten different priority needs that must be addressed in cybercrime
(see Section sec:crime).
( Hint: Begin with the need for “public awareness” at the top of your list. )
10.2. Name five advantages to information sharing between policing agencies
in various countries when it comes to cybercrime.
10.3. Name five steps that might be used in the gathering of digital data in a
cybercrime.
( Hint: Start with: “Evaluate the target”. )
Search WWH ::




Custom Search