You are on page 1of 1

Dept of E&C Engg, NITK Surathkal

EC445 N UMBER T HEORY & A PPLICATIONS IN E&C E NGG E NGG


P ROBLEMS S ET 2 Submission Deadline 28th October 2015 This assignment is for 10 marks!
If you are planning to copy assignments from your friends, you might want to think twice before doing so, cos
you will be in the same position as you would be if you dont submit your copied assignment! The net result is Zero
Zero!!!
Fibonacci Numbers: fn = fn1 + fn2 and f1 = f2 = 1. Lucas Numbers: Ln = Ln1 + Ln2 and L1 = 2, L2 = 1
Alphabets

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

1. With respect to Fibonacci sequence, establish the following identities. You may use Mathematical Induction
wherever applicable.
A. fn fn5 = 10fn5 + fn10
B. fn+6 = 4fn+3 + fn
C. For a natural number a, fa fn +
fa+1 fn+1 = fa+n+1 .
D. Binets formula for classical Fibonacci Sequences.
E. Ratio of successive
Fibonacci numbers converge to the golden mean.
2. With respect to Lucas numbers, prove the following:
n
n
X
X
L2i1 = L2n 2
Li = Ln+2 3
B.
A.
i=1

C.

n
X

L2i = L2n+1 1

3. Express the following rational numbers into continued fractions:


D. 50/79 E. 13/19
1
1+

1
2+

1
2+ 1
3

n
X

L2i = Ln Ln+1 2

i=1

i=1

i=1

4. Evaluate the following continued fractions: A. 1 +

D.

A. 75/31

B. 1 +

B. 29/8

C. 1363/422

1
2+

1
3+

1
4+ 1
5

5. Prove that the numbers 2a - 1 and 2b - 1 are relatively prime if and only if a and b are relatively prime. What is
the representational efficiency of a residue number system that uses the above two moduli?
6. Obtain the representational efficiency of RN S(15|13|11|8|7).
7. Encrypt the message SECRET MESSAGE using the keyword KRYPTOTEKNIK
8. Caeser wants to arrange a secret meeting with Marc Antony, either at the Tiber (river) or at the Coliseum (the
arena). He sends the cipher text EVIRE. However, Antony does not know the key, so he tries all possibilities.
Where will he meet?
9. An encryption is done letter by letter using an affine cipher with single letter keys , . Using the English alphabet
so that N = 26 we find that 6 is encrypted by 23 and 15 is encrypted by 24. What are the keys , ?
10. The cipher text SUYMC PTTWC MLCPU FRRGUG KCPWI TJQMA O was enciphered using an affine cipher.
Decipher it!
11. Decrypt the following cryptogram which was obtained using substitution cipher.
LTOFKFKXTTEDJNLTRCPTFJSLTLFSPTTJFKXTTELTNLCVGLNMCRFXCJGNDWTN
LTRCPTOFKKERTFSCJNLMCRTKNMXCCRDJNLTXTTCMNLTRCIZKPTHCJSNLTIFATWCVNLFJSFKL
TKXTENLTNVRJTSFJSNVRJDJGRXXTSCJLDKEDKNCXOLDILOFKMFKNTJTSPH
FXFJHFRSNCCJTORDKNNLTICSTOCRSMCRNLDKIDELTRDKFPKDJNLT
Probably a single paragraph text!

You might also like