10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8.7 Exercises 433<br />

standards insist on such presence.) The interesting research of [Okeya and<br />

Sakurai 2001] is relevant to this design problem. In fact such issues—usually<br />

relating to casting efficient ECC onto chips or smart cards—abound in the<br />

current literature. A simple Internet search on ECC optimizations now brings<br />

up a great many very recent references. Just one place (of many) to get started<br />

on this topic is [Berta and Mann 2002] and references therein.<br />

8.7. Devise a coin-flip protocol based on the idea that if n is the product of<br />

two different odd primes, then quadratic residues modulo n have 4 square roots<br />

of the form ±a, ±b. Further computing these square roots, given the quadratic<br />

residue, is easy when one knows the prime factorization of n and, conversely,<br />

when one has the 4 square roots, the factorization of n is immediate. Note in<br />

this connection the Blum integers of Exercise 2.26, which integers are often<br />

used in coin-flip protocols. References are [Schneier 1996] and [Bressoud and<br />

Wagon 2000, p. 146].<br />

8.8. Explore the possibility of cryptographic defects in Algorithm 8.1.11.<br />

For example, Bob could cheat if he could quickly factor n, so the fairness<br />

of the protocol, as with many others, should be predicated on the presumed<br />

difficulty in factoring the number n that Alice sends. Is there any way for<br />

Alice to cheat by somehow misleading Bob into preferring one of the primes<br />

over the other? If Bob knows or guesses that Alice is choosing the primes<br />

p, q, r at random in a certain range, is there some way for him to improve his<br />

chances? Is there any way for either party to lose on purpose?<br />

8.9. It is stated after Algorithm 8.1.11 that a coin-flip protocol can be<br />

extended to group games such as poker. Choose a specific protocol (from the<br />

text algorithm or such references as in Exercise 8.7), and write out explicitly<br />

a design for “telephone poker,” in which there is, over a party-line phone<br />

connection, a deal of say 5 cards per person, hands eventually claimed, and<br />

so on. It may be intuitively clear that if flipping a coin can be done, so can<br />

this poker game, but the exercise here is to be explicit in the design of a<br />

full-fledged poker game.<br />

8.10. Prove that the verification step of Algorithm 8.1.8 works, and discuss<br />

both the probability of a false signature getting through and the difficulty of<br />

forging.<br />

8.11. Design a random-number generator based on a one-way function. It<br />

turns out that any suitable one-way function can be used to this effect. One<br />

reference is [H˚astad et al. 1999]; another is [Lagarias 1990].<br />

8.12. Implement the Halton-sequence fast qMC Algorithm 8.3.6 for dimension<br />

D = 2, and plot graphically a cloud of some thousands of points in the<br />

unit square. Comment on the qualitative (visual) difference between your plot<br />

and a plot of simple random coordinates.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!