10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8.7 Exercises 431<br />

universal Golden scale, based on a geometry of intervals related in Golden<br />

proportion. The author provides the ratios and dimensions of its intervals<br />

and explains the specific intonation interest of such a cycle of Golden fifths,<br />

unfolding into microtonal coincidences with the first five significant prime<br />

numbers ratio intervals (3:5:7:11:13).<br />

From these and other musicology references it appears that not just the<br />

very smallest primes, rather also some two-digit primes, play a role in music<br />

theory. Who can tell whether larger primes will one day appear in such<br />

investigations, especially given how forcefully the human–machine–algorithm<br />

interactions have emerged in modern times?<br />

8.7 Exercises<br />

8.1. Explain quantitatively what R. Brent meant when he said that to<br />

remember the digits of 65537, you recite the mnemonic<br />

“Fermat prime, maybe the largest.”<br />

Along the same lines, to which factor of which Fermat number does the<br />

following mnemonic of J. Pollard apply?<br />

“I am now entirely persuaded to employ rho method, a handy trick, on<br />

gigantic composite numbers.”<br />

8.2. Over the years many attacks on the RSA cryptosystem have been<br />

developed, some of these attacks being elementary but some involving deep<br />

number-theoretical notions. Analyze one or more RSA attacks as follows:<br />

(1) Say that a security provider wishes to live easily, dishing out the same<br />

modulus N = pq for each of U users. A trusted central authority, say,<br />

establishes for each user u ∈ [1,U] a unique private key Du and public<br />

key (N,Eu). Argue carefully exactly why the entire system is insecure.<br />

(2) Show that Alice could fool (an unsuspecting) Bob into signing a bogus (say<br />

harmful to Bob) message x, in the following sense. Referring to Algorithm<br />

8.1.4, say that Alice chooses a random r and can get Bob to sign and<br />

send back the “random” message x ′ = r EB x mod NB. Show that Alice<br />

can then readily compute an s such that s EB mod NB = x, so that Alice<br />

would possess a signed version of the harmful x.<br />

(3) Here we consider a small-private-exponent attack based on an analysis<br />

in [Wiener 1990]. Consider an RSA modulus N = pq with q

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!