Coding theory, cryptography and cryptographic protocols - exercises with solutions
نویسندگان
چکیده
The main goal of this work is to present detailed solutions of exercises that have been submitted to students of the course Coding, cryptography and cryptographic protocols, given by prof. RNDr. Jozef Gruska, DrSc. in 2006 as homeworks. This way a handbook of solved exercises from coding theory and cryptography is created. Ahead of each set of new exercises we include main concepts and results from the corresponding lecture that are needed to solve exercises.
منابع مشابه
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملSecurity Protocols, Constraint Systems, and Group Theories
When formally analyzing security protocols it is often important to express properties in terms of an adversary’s inability to distinguish two protocols. It has been shown that this problem amounts to deciding the equivalence of two constraint systems, i.e., whether they have the same set of solutions. In this paper we study this equivalence problem when cryptographic primitives are modeled usi...
متن کاملSecond Summary Report on Unconditionally Secure Protocols
This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary’s knowledge in an information-theoretic or quantumtheoretic sense. They provide a very strong form of security because they cannot even be attacked by an adversary with unlimited computational resources, in contrast to the notion of computational security used otherwi...
متن کاملPolynomial Reconstruction Based Cryptography (A Short Survey)
Cryptography and Coding Theory are closely knitted in many respects. Recently, the problem of Decoding Reed Solomon Codes (aka Polynomial Reconstruction) was suggested as an intractability assumption upon which the security of cryptographic protocols can be based. This has initiated a line of research that exploited the rich algebraic structure of the problem and related subproblems of which in...
متن کامل