Exercises

Some exercises will require theory that will not be lectured. You should read the required theory on your own. If no references are given, you will find the material in Stinson. DH, SYM, PKE, SHOR, LAT and SIG refer to the lecture notes.

Some of the exercises will be in the Department of Mathematical Sciences' student computer lab.

The exercises are not obligatory, but they are essential for learning.

WeekDateExercisesNotes
3530/8Routine: DH 1, SYM 1, 5, 10, 15, 16. Regular: DH 2,3, SYM 2, 3, 6, 7, 9, 11, 12, 17, 18, 20, 21. Problem 1 from the 2012 exam. For groups: SYM 4, 8, 14, 19. Computer helpful: SYM 13.
366/9Routine: SYM 22, 23, 24, 27, 30, 35, 37. DH 7, 15, 17, 18 Regular: Problem 1 from the 2013 exam. SYM 25, 26, 28, 29. DH 4-6, 8-14, 16. For groups: SYM 31, 33, 34, 36. Computer helpful: SYM 32
3713/9Routine: DH 23, 27, 33, 37. Regular: DH 19-22, 24-26, 28-32, 34-36, 38.
3820/9Routine: DH 41, 47, 49. Regular: 39, 40, 42-46, 48, 50, 51.
3927/9Regular: DH 52-55. Problem 2 from the 2001 exam. Problem 4 from the 2002 exam. Problem 2 from the 2003 exam. Problem 1a and 1b from the 2009 exam.
404/10Regular: DH 56, 58-64. Problem 2 from the 2012 exam. Problem 3 from the 2013 exam. Hard: DH 57.
4111/10Routine: PKE 1, 2, 7, 10, 12, 19, 21. Regular: PKE 3, 4, 8, 9, 11, 13, 14, 18, 20. Problem 3 and 4 from the 2006 exam.
4218/10Routine: PKE 22, 24, 26, 32. Regular: PKE 23, 25, 27-31, 33. Problem 6 and 7a from the 2014 exam.
4325/10Routine: LAT 13. Minor: SHOR 1-4. LAT 3, 6, 8 Regular: LAT 1, 2, 4, 5, 7, 9-12. Problem 3 from the 2015 exam.
441/11Routine: LAT 20. Regular: LAT 15-19. Computer helpful: LAT 14, 21.
458/11Routine: SYM 38, 40, 41. SIG 7 Regular: SYM 39, 42. SIG 1, 2, 8-11. PKE 5-6, 15-17. Problem 1 from the 2010 exam. Problem 2 from the 2014 exam.
4615/11Routine: SIG 19, 21. Regular: SIG 3-6, 12-18, 20, 22, 23. Problem 5 from the 2013 exam.
4722/11Computer exercise: d.log., factoring and ec.d.log. Also: Make up your own factoring/d.log/ec.d.log problems and challenge your classmates.Recap of previous exercises.

Group exercises

SYM 33

The following ciphertext was encrypted using the Vigenère cipher with a key of length 5 \( (l = 5) \).

UYCQUGQSLVVZTIUODCZLEPQLBUEOFVVSONSTPQCSKEONHHCCGWJPONPQDDBHTPIMXCWZSITZAWOQFRMDPOIHGGCUIFJLBAHUZBNK
GPOLWJDGOUHLQYLVASLWCTBMWQQFICGYQLBUEOFOKYSQDVPFNKTZIAKQFHCWUWWZHEJQFHUEOLWKYUQKGYIHGGCGOLVLPFHEZBXL
VTCHVVSSCFGNFSVVLZMIQCACQVSSUWOZGJKGCSCQECSUVGECGLNWWGHVPFMLBPDLHETDCWCESUQFLQWXOFZUWGZBMXTQOWHUEVYQ
OPHUPQCDBRUPWHSNLQYDPOIFWKXONHNJAYOVDZCGGZFMXDWWGDVPOQDADBIZUECLPUZFADPTNYDPORYYGWCJEAQSYGKYUIQUZILF
GDCZDVXCMSJPFCFOZWMWWCSUQFNCFGCTFMQQHTFDMPGHXEWSUWGLFIXPODUUVTQFHUTBNKGLHGRUAVYUGMMUWVCOWWKYUMXRPFWR
QWSXZCESLGTZDFHVDKBLESTLHGKSCQJPLUJQYOFVJLDYGECMMWCWGMQQHTFDMPGNDMPCHDXLFCHVJCZVJLDYVDLGCFCXCHJVSSMH
CCSJOCESFHVDBYHFWSMFQWIGQULBXUKXSUVUYCQDENIGXNLHYVKYHIDUYCQSCNYCWOLMVOQHWHWQOFCIVDCPHTEWGHCNQOPWWONH
FDBIZOPHUPQCDBRUPGVBUTBNHTTBAVWMZCPCEWIQCYRZUGPNYWJLKQKGCSNKGNZCPCESCVEZZXHPZIAKHZFSHCCHIBGLFUFEFAOO
CEWIQCRZUFKPFGDAQCLPQEVYUYTGYVPZKNBRTQUONJAYOVDGYDUZBUONJQUXUTBAUWYCZIKYHIVVCSUPULBXUKGSLVCYRLHESOLJ
KYUAUQFBXZCESL

You could use this tool to decrypt.

SYM 34

The following ciphertext was encrypted using the Vigenère cipher.

KCFEEKXTIAGUXDIUFUXXTMPXQHKIYYLWRBCXWRZXVZSIVNEUEIYMNZEDJXUKJTLAHGDAPNEUERCWHJKPELHTVTIOBIZPEORYGCKP
RKSGKPFYMGWIPKAIGMEZSXEAGUXGFHRTUGPAGGDAZVRCSIVZGNJDLOUUMIZBFRAUVKLIDTJBNXLXEOJNWCLVQKJHLQGGTAVKBTVX
KQBTKIYMVIWRIGFZSAJNBXEXEBUKSIDWFVZTIMVTUGVIFKLDDQYRABVBRXKXQMCXWRZXVZSIVIAJSRTCZADPKMBTKJINNIWHKPRT
ETKIZUJEYWFKACGTNIWPELHRLXDIGKDNDMYZKAZLRUJHLJYOEPKMNCSNJVBCKIFZZYGGXIAORTRVQJWKVTBVTNWMRJACXWAYGJIK
RYGURBZUKEYMEOUBFQFZMGVIAJUDCLNOJHEWJLDPBMFTMRCMNZWPIWHTVERZGOUAVAVTLWVIGSGHGPRXWQPIGZJPTBVTYHLXRXUD
FTRJOPKMEJJDGTRZKLYQPNXGVMMKACYMKGYDEIYYZPGMQIJNJBNRKHEWJLDPBMFZSZVWAGNPIQRZQDWAUGHTJJNYARRUBTYIYMFK
SGVXYGLTCMGYFTVLYKKRFTHSFHRVQXABVIFYFDNIPIMBLTNZWHZVGUSHEWJVSRBQGSSNSTBCACKWQXAUKABBWGKQZKSRTCZADPKM
QYFDNURZSBFZCNGHVAOEKXEBRXACXAHHDXDIGOGCRVQLJTVHRZZPNEUKJTKPRIDXDIGKAHTWYJWCFCTNXDIGRGJIFGRGJPTKHSMA
RBVUFPXTNIATIUNEXDIUBZZTIEVYWHEWJZQEZKNRDNDMYZKHVIFUFPCTLISJJQAMJJEWSLACKWFZJTRUFGFSIQIKJHRVQXWRYIEM
ACXOEUMCUENZWG

Determine the length of the key.

2017-11-20, Kristian Gjøsteen