Determine whether x is even or odd

Assignment Help Computer Network Security
Reference no: EM131299400

1. If a number n is composite but in the Miller-Rabin algorithm Test (n,a) outputs "n is probably prime" (see the textbook page 178https://calclab.math.tamu.edu/~rahe/2014a_673_700720/Trappe_2006.pdf), then a is said to be a false Miller-Rabin witness for n. Show that 2 is a false Miller-Rabin witness strong for 2047.

2. Let p = 101 (note that 101 is a prime number). It is known that 2 is a primitive root of 101. For any number n in the range {1,2,..., 100}, we denote by L2(n) the value k ∈ {1,2,..., 100} such that 2k = n (mod 101) (i.e., L2(n) is the discrete log of n mod 101).

a) What is L2(1)? Justify your answer. (Note: The answer k= 0 is not valid, because k has to be in the set {1,2,..., 100} ).

(b) Using the fact that L2(3) = 69, determine L2(9). Justify your answer.

3. It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223).

Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers

Hints: First see how much is 5611 x (mod 1223) using the information given in the problem. Then use the fact that the equation y2 = 1 (mod 1223) has the solutions 1 and -1. Next let y = 5611 (mod 1223). How much is y2 (mod 1223) (recall that 1223 is prime) ? How much is y?

Reference no: EM131299400

Questions Cloud

What impact would given have on the total flow of cars : What impact would this have on the total flow of cars? Would the total flow of cars increase by 400 cars per hour?
Describe the design of a matched pairs experiment : The reading of the scale shows the force exerted. Describe the design of a matched pairs experiment to compare the strength of the right and left hands, using 10 right handed people as subjects. (You need not actually do the randomization.)
Is the diagnosis a treatment variable or a block : Doctors and nurses. Nurse practitioners are nurses with advanced qualifications who often act much like primary care physicians. An experiment assigned 1316 patients who had no regular source of medical care to either a doctor (510 patients) or a ..
Compute the tax refund or taxes to be paid for 2016 : Download the schedules from the IRS website and prepare the following: Schedule A, B, C, D and E. Complete the 1040 and compute the tax refund or taxes to be paid for 2016
Determine whether x is even or odd : It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223). Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers.
Reduce greenhouse gas emissions : 1) Will the need to reduce greenhouse gas emissions such as carbon dioxide kill certain industries? 2) What happens to a utilities Marginal Costs (MC) as they are compelled to reduce carbon emissions?
How many explanatory variables are there : How many explanatory variables are there? How many treatments? Use a diagram like Figure 6.1 to describe the treatments. How many experimental individuals does the experiment require?
Explain the development of post-world war ii : Explain the development of post-world war II American foreign policy in the era 1945-1965 - What challenges did the country face abroad? What was the general doctrine?
Draw the shear force and bending moment diagrams : MECT 6322 - Computer Aided Engineering Deflection and reactions at the nodes and Draw the shear force and bending moment diagrams (using FEM) - Find the exact solution for the velocity profile.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Problem regarding the digital computer crime

Explain the four (4) major categories of computercrimes, and provide at least one (1) example for each.Explain the most common forms ofdigitalcrime.

  Case study on attacking more than just the enterprise

Question 1: Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers. Question 2: Compare and contrast the digital forensic operations of small-siz..

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  How many fiu webpages contain admin in the url

Search to find how many FIU webpages contain admin in the URL (hint: must combine multiple directives) Record how many hits found and explain why this would be valuable in conducting reconnaissance, what do we learn or find out? Try

  Describe the new method in details and theoretical basis

Analyze advantages and weaknesses of the new protection method (e. g. implementation cost, runtime, reliability, stability and etc.)

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Discuss thoroughly vpns and how they are implemented

Discuss thoroughly VPNs and how they are implemented and Discuss both symmetric and asymmetric cryptographic algorithms. Also, explain cryptographic tools. Which should FDU consider

  Describe any risks or threats mitigated by using firewall

Install an application-based firewall on a personal workstation. In one paragraph, describe the name and version of the firewall installed and its core features. In a second paragraph, describe any risks or threats mitigated by using this firewall..

  Describe the acquisition procedures and tools for windows

Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition - Describe the acquisition procedures and tools for Windows and Linux data acquisitions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd