Professional Documents
Culture Documents
E Puzzles
E Puzzles
Mathematical Puzzles
An amusing,
brisk and cool,
enriching and entertaining,
informative and oriented towards practical applications,
playful,
relevant and rewarding,
stimulating,
thought-provoking
little contribution to the (general) mathematical education!
c 2002–2014 risse(at)hs-bremen.de
Last Revision Date: August 8, 2014 Version 0.5
Table of Contents
0. Introduction
1. Riddles [7]
• Measuring with Two Jugs • Races • Census and its Boycott
• Zig-Zag between Trains • Outward and Return Journey
• Magic Squares • Conspicuous Text • No Talk about Money
• Corrupt Postal System • Equal Opportunities • Two and
More Eyes
2. More Riddles [11]
• Matches • Decanting • Analytical Riddles I • Analytical
Riddles II • Analytical Riddles III • Analytical Riddles IV
• Analytical Riddles V • Crossing a Bridge • Synthetic Rid-
dles I • Synthetic Riddles II • Synthetic Riddles III • Syn-
thetic Riddles IV • Dialectic Riddle • Riddles, 588 • Riddles,
622 • Labyrinth, 652 • Riddles, 680 • Riddles, 708 • Riddles,
734 • Riddles, 750 • Riddles, 772
3. Prime Numbers
Table of Contents (cont.) 3
0. Introduction
1. Riddles [7]
• Races
Problem 2.
(a) Climbing a 3000m mountain top Sisyphos makes 300m a day only
to loose 200m each night again.
Wenn does Sisyphos reach the top?
Section 1: Riddles [7] 6
(b) At a 100m race the first runner A beats the second B by 10m,
and the second B beats the third C by 10m.
How many meters is the first runner A ahead of the third C when
crossing the finishing line?
Problem 3.
(a) At a census there is the following dialog:
Field helper: number of children?
Citizen: three!
Field helper: age of Your children in whole numbers?
Citizen: The product of the years is 36.
Field helper: This not a sufficent answer!
Citizen: The sum of the ages equals the
number of the house of our next neighbour.
(Field helper acquires the number.)
Field helper: That is still not a sufficient answer!
Section 1: Riddles [7] 7
Problem 4.
(a) Two trains start on the same line 100km apart to drive at 50km/h
towards each other. A fly flies from one to the other at 75km/h.
How many kilometres has the fly travelled up to its unavoidable
fate?
Problem 5.
(a) In A somebody gets up at sunrise and walks with many rests to
B where he arrives at sunset.
The next day he walks back on the same route, again pausing a
bit here and there.
Section 1: Riddles [7] 8
There is a point of the route the roamer at the same time of day
hits both on the outward as on the return journey.
• Magic Squares
Problem 6.
(a) Magic squares are natural numbers arranged in a square grid, i.e.
a quadratic matrix, such that the sum of all numbers in each row,
in each column, and in each diagonal are all the same!
a b c a + b + c = s ...
d e f mit a + d + g = s ...
g h i a + e + i = s ...
Taking symmetry into consideration, there is exactly one magic
square consisting of the natural numbers 1, 2, . . . , 9 arranged in
a 3 × 3-matrix.
Section 1: Riddles [7] 9
• Conspicuous Text
Problem 7.
(a) Study this paragraph and all things in it. What is virtually wrong
with it? Actually, nothing in it is wrong, but you must admit
that it is most unusual. Don’t zip through it quickly, but study
it scrupulously. With luck you should spot what is so particular
about it. Can you say what it is? Tax your brains and try again.
Don’t miss a word or a symbol. It isn’t all that difficult.
Problem 8.
(a) The boss in an office wants to acquire the average salary of his
employees without getting to know individual salaries und thus
breaking privacy. How does he proceed?
Section 1: Riddles [7] 10
• Equal Opportunities
Problem 10.
(a) Alice and Bob live in different cities and decide to go to see each
other in turns. They want to find out who starts to drive to the
other by tossing a coin.
How do they find out if they live in different cities?
Section 1: Riddles [7] 11
Problem 11. It is called the Two Eyes Principle if two persons each
with a separate key are necessary to open a treasure box, or if two
passwords are necessary to open a file.
Each person opens her/his lock of the treasure box by her/his own
key or adds her/his part of the password to complete the password.
(a) Alice, Bob and Claire own a treasure box with several locks. They
want to make sure that only at least two persons together can get
at the content of the treasure box.
How many locks and how many keys to each lock do they need?
(b) Now, Alice, Bob, Claire and Denis want to be sure that only at
least two persons together can open the treasure box.
Minimally how many locks and minimally how many keys to each
lock do they need?
(c) Only at least m persons together out of a total of n persons are
meant to be able to open the treasure box.
How many locks, how many keys do they need?
12
• Matches
• Decanting
Problem 13.
(a) How can one get 6 litres water from a river if there are only a four
litre and a nine litre bucket available?
(b) How can one get exactly 1 litre from a container if there are only
a 3-litre and a 5-litre container available?
(c) A 8 litre canister is filled with wine. How to decant 4 litre if there
are only a 3-litre and a 5-litre jug available?
(d) A barrel contains 18 litres wine. There is a 2-litre can, a 5-litre
jug and a 8-litre bucket. How to distribute the wine such that the
barrel contains half of it, the bucket a third, the jug a sixth?
• Analytical Riddles I
Problem 14.
(a) Let the sum of the ages of a family of four, father, mother, and
two children, be 124. The parents together are three times as
Section 2: More Riddles [11] 14
old as the children. The mother is more than twice as old as the
oldest child. Age of father minus age of mother is nine times the
difference age of the oldest minus age of the youngest child. How
old is each member of the family?
(b) Emil is 24 years old. Hence, he is twice as old as Anton has been
when Emil was as old as Anton is now. How old is Anton?
(c) In a supermarket one gets a deduction of 20%, but has to pay 15%
turnover tax. What is best, first to deduct the discount or first to
pay the tax?
2
1
The L-shaped area is to be divided into four con-
(d) 2
gruent subareas.
1
(e) If Fritz was 5 years younger then he was twice as old as Paul was
when he was 6 years younger. Wenn Fritz was 9 years older then
he was trice as old as Paul when Paul was 4 years younger. How
old are Fritz and Paul?
Section 2: More Riddles [11] 15
• Analytical Riddles II
Problem 15.
The vertices of the triangle are labeled with un-
11 18 known integers. The edges are labeled with the
(a)
sum of the labels of the incident vertices. What
27 are the vertex labels?
(b) Hans is 34 years, his wife is 30 and his daughter 7 years old. How
many years before wife and daughter together were as old as Hans?
(c) Three geese together weight 10kg. The second goose is by a third
heavier than the first one. The third goose is by a fourth lighter
than the second one. What are the weights of the geese?
(d) Are there four positive integers summing up to 79 with
• The second is by one smaller than double the first.
• The third is by one smaller than double the second.
• The fourth is by one smaller than double the third.
(e) Loaded with sacks, a mule and a donkey trudge somewhere. When
the donkey groaned under the load the mule said: What are You
complaining? Double Your load I’d had to carry if You’d give me
Section 2: More Riddles [11] 16
Problem 16.
(a) What is the radius of a circle whith the same number of inches
circumference as the number of square inches area?
(b) A train passes in 7sec the station master. The platform is 330m
long. It takes 18sec from the beginning of the platform and the
locomotive to the end of the platform and the last railway car.
How long is the train and how fast is it going?
(c) A worker produces parts with a rate of 10 parts a day for the first
half of the lot and a rate of 30 parts a day for the second half.
How many parts per day did the worker produce on average?
(d) Are all palindromial numbers with four decimal digits divisable
by 11?
Section 2: More Riddles [11] 17
(e) As I was going to St. Ives / I met a man with seven wives. / Each
wife had seven sacks, / Each sack had seven cats, / Each cat had
seven kids, / Kids, cats, sacks, wives, / How many were going to
St. Ives?
(f) By which fraction exceeds four fourth the number three fourth?
• Analytical Riddles IV
Problem 17.
(a) If 5 cats catch 5 mice in 5 minutes how many cats catch 100 mice
in 100 minutes?
(b) How to multiply
(c) One and a half hens lay one and a half egg in one and a half day.
How many eggs do seven hens lay in six days?
(d) There are four types of balls: A, B, C, and D. Balls of the same
type have the same weight. It is known that
• two balls of type B are as heavy as one ball of type A,
• three balls of type C are as heavy as one ball of type B,
Section 2: More Riddles [11] 18
• Analytical Riddles V
Problem 18.
(a) With constant speed a train crosses a 255 m long bridge in 27 sec,
from the of the locomotive to the bridge until the of the last
railway car from the bridge. The train passes a pedestrian walking
in the opposite direction of the train in 9 sec during which time
the pedestrian moves 9 m. How long is the train and how fast is
it?
(b) x2 − x2 = x2 − x2 ⇒ (x + x)(x − x) = x(x − x) ⇒ x + x = x ⇒
2x = x ⇒ 2 = 1 Where is the mistake?
Section 2: More Riddles [11] 19
• Crossing a Bridge
Problem 19.
(a) Four persons have to cross a suspension bridge at night. To do so
one needs a torch. There is only one torch available with maximal
burn time of one hour. There must not be more than two persons
on the bridge at the same time. The four persons take different
times to cross the bridge: A 5 min, B: 10 min, C: 20 min, D:
25 min. The slower person sets the speed. In which order do the
four persons have to cross the bridge so that all four reach the
other side within one hour?
• Synthetic Riddles I
Problem 20.
Section 2: More Riddles [11] 21
The equilateral triangle can be partitioned into
(a)
2
three congruent subtriangles.
2
The L-shaped figure can be partitioned into four
1
1
congruent (L-shaped) subfigures.
Can also a square be partitioned into five congru-
ent subfigures?
The coins are to be moved so that two straigth
(b)
rows with four coins each are produced.
The nine dots are to be connected off the reel by
(c)
four straight lines.
(d) Each of the 30 vassals has to pay 30 gold coins to the king. One
of them is known to pay with 9g coins instead of the obligatory
10g coins. How can the king with a single weighing identify the
fraudster?
• Synthetic Riddles II
Problem 21.
(a) Three farmers together order a plough for 30 taler. Each farmer
Section 2: More Riddles [11] 22
Problem 22.
(a) Expand (x − a)(x − b) . . . (x − z).
(b) A very heavy armchair is to be moved. But it can only be turned
Section 2: More Riddles [11] 23
• Synthetic Riddles IV
Problem 23.
(a) A cuboid is to saw up into 27 congruent little cuboids. This is
possible with six cuts. Is it also possible with fewer cuts?
1 floor 2 floors 3 floors
• Dialectic Riddle
Problem 24.
(a) Three captives are released if they solve the following task: they
are blindfolded and positioned in an equilateral triangle looking
to its center of gravity. Behind each of them is set up one of
five flags, three white and two black ones. The two leftover flags
are discarded. Then the blindfolds are removed and each captive
tries to determine the color of the flag behind. After quite a while
of intense consideration they nearly at the same time name the
correct color of the flag behind them. How is that?
Section 2: More Riddles [11] 25
• Riddles, 588
Problem 25.
(a) 81 persons take part in a cross country run, twice as many men
than women. The number of children and twens is half the number
of adults. Twice as many twens as children take part. How many
men, women, twens, and children take part?
(b) FFFEEE symbolizes a row of six glasses, three full and three empty
ones.
Touch/move only one glas (full or empty) to get a row of glasses
every second is full and every second is empty.
=
(c) Move only one match to get a correct equation.
(d) Engine driver, stoker and conductor of a train are Mr. J., M., and
B. On the train there are travellors Dr. J., Dr. M., and Dr. B.
1. Dr. B. lives in Charlottenburg.
2. Dr. J. earns 5000Euro a month.
3. The conductor lives half way between Charlottenburg and Nürn-
berg.
Section 2: More Riddles [11] 26
• Riddles, 622
Problem 26.
(a) Are there 204 squares on a standard chess board?
(b) Drawing any number of lines through some square partitions the
square into disjoint regions. How many colors are needed at least
to color these regions such that no two adjacent regions have the
same color?
(c) Mrs. A., E., I., O. and U. work in a star-shaped office with a
central main office and offices in the north, west, south and east.
The wing offices are connected by the main office. Before A. and
me exchanged work places, my office was north of O.s who worked
east of U. who worked west of E. At that time A. worked east of I.
In addition A. had to make a right in in the central office when she
went to see E. Whereas me, I had to walk straight in the central
office when I went to see A. Who works where? and who is me?
Section 2: More Riddles [11] 28
• Labyrinth, 652
Problem 27.
(a) Find the intersection-free path through the labyrinth back to the
starting point.
• Riddles, 680
Problem 28.
(a) How can one measure 15min using a 7-min- and a 11-min-sandglass?
• Riddles, 708
Problem 29.
(a) Mr. Punctual sets his clock on Saturday noon by the radio. On
Sunday noon he recognizes that his clock is six minutes late. What
is the time on his clock on Monday at 8h?
Section 2: More Riddles [11] 29
(b) At a bakery a woman buys half of all breads and half a loaf. Then,
a second woman buys half of all remaining breads and half a loaf.
After that, a third woman buys half of all remaining breads and
half a loaf. Now, all breads are sold. How many breads did the
baker sell?
(c) An automatic stamp tool prints consecutive numbers starting with
0, one number per second. How often does it print the digit 1 in
the the first quarter of an hour?
• Riddles, 734
Problem 30.
(a) If campainers group themselves in rows of two, three upto ten,
then in each case there is one campainer too little. How many
campainers are there, if there are less than 5000 campainers?
(b) ’My sister, you have as many brothers as sisters!’
’My brother, you have twice as many sisters as brothers!’
What is the number of children in this family?
Section 2: More Riddles [11] 30
(c) The difference of the ages of two sisters is four. The difference
of the cube of the age of the first and the cube of the age of the
second is 988. How old is each sister?
• Riddles, 750
Problem 31.
(a) On a farm there are equally many cows, pigs, horses and rabbits.
There is a plague and all complain:
Father: every fifth cow died. Mother: there are as many dead
horses as surviving pigs. Son: the new percentage of rabbits (out
of the survivers) is 5/14. Grandma: death has hit each kind of
animals.
Prove that grandma is wrong.
• Riddles, 772
Problem 32.
Section 2: More Riddles [11] 31
(a) A bottle of wine costs 9 Euro. The wine costs 8 Euro more than
the bottle. What is the price of the bottle only?
(b) A father bequeathes his three sons 30 wine barrels, ten of which
are full, ten half empty and ten empty. How to devide barrels and
wine so that each son gets the same number of barrels and the
same amount of wine?
32
3. Prime Numbers
• Fermat-Numbers
• Euler-Numbers
• Mersenne-Numbers
Problem 36.
(a) Which day of the week do we have in n days?
(b) Which day of the week did we have n days ago?
(c) How is the UNIX-date computed, if an internal counter counts the
seconds since 1.1.1970 0h ?
Section 4: Computations with Remainders 36
Problem 37.
(a) Connection of n mod m = r and n ≡ r (mod m) ?
(b) additivity, multiplicativity:
n1 ≡ r1 (mod m) (n1 ± n2 ) ≡ (r1 ± r2 ) (mod m)
⇒
n2 ≡ r2 (mod m) (n1 · n2 ) ≡ (r1 · r2 ) (mod m)
(c) scalar multiples, powers
c · n ≡ c · r (mod m) für jedes c ∈ N
n ≡ r (mod m) ⇒
np ≡ rp (mod m) für jedes p ∈ N
(d) transitivity
r ≡ s (mod m), s ≡ t (mod m) ⇒ r ≡ t (mod m)
Section 4: Computations with Remainders 37
• Chinese Stuff
Problem 41.
(a) Chinese Remainder Theorem: Let m1 , m2 , . . . , mn ∈ N be
pairwise relatively prime. To find all solutions x ∈ N with
x ≡ ri (mod mi ) für i = 1, . . . , n
Qn
determine m = i=1 mi and bi = m/mi as well as xi with
xi bi = 1 mod mi , hence xi as the (modulo mi )-inverse to bi for
i = 1, . . . , n. Then:
Xn
x≡ (xi bi ri ) (mod m)
i=1
Problem 44.
(a) How do multiplication and computation of inverse elements in
GF(22 ) with m(x) = x2 + x + 1 look like?
(b) Let m(x) be an irreducible polynomial over GF(p) of degree n.
Defining a multiplication by
r · s := r(x) · s(x) mod m(x)
for r, s ∈ GF(pn )∗ then, what is GF(pn )∗ , · ?
5. Cryptography
Problem 45.
Let the letters of the Latin alphabet be numbered from 0 to 25 !
(a) Caesar9 - encryption/decryption:
Plain text x1 x2 x3 . . . is letter-wise encrypted by key k per
y = (x + k) mod 26 to give the encrypted text y1 y2 y3 . . .
Encrypted text y1 y2 y3 . . . is letter-wise decrypted by key k per
x = (y − k) mod 26 to give the plain text x1 x2 x3 . . ..
There is a encrypted text wklvlvdwrsvhfuhwphvvdjh.
(b) How many keys are there? What degree of security is achieved?
• Caesar in General
Problem 46.
Let the letters of the Latin alphabet be numbered from 0 to 25 !
(a) Under which condition is y = (kx) mod m a useful encryption
method?
(b) When
encrypting per y = (k x) mod m and
decrypting per x = (k inv y) mod m what k inv has to be used?
(c) Combining both methods gives
encryption per y = (k1 x + ko ) mod m and
decryption per x = (k10 y + ko0 ) mod m using which k10 und ko0 ?
(d) How many keys are there? What degree of security is achieved?
Section 5: Cryptography 47
Problem 47.
Let the letters of the Latin alphabet be numbered from 0 to 25 !
(a) Vigenère10 -encryption/decryption:
Plain text x1 x2 x3 . . . is letter-wise encrypted to encrypted text
y1 y2 y3 . . . per yi = (xi + ki mod l ) mod 26 using key ko k1 ...kl−1 ,
encrypted text y1 y2 y3 . . . is letter-wise decrypted to plain text
x1 x2 x3 . . . per xi = (yi − ki mod l ) mod 26 using key ko k1 ...kl−1 .
dlgcmqkxmzwcmvcdqccwyqi is an encrypted message.
(b) How many keys are there? What degree of security is achieved?
• Permutations
• DES
Problem 50. Since its publication, the security of the Data Encryp-
tion Standard, DES was disputed, cp. e.g.
http://en.wikipedia.org/wiki/Data Encryption Standard.
In mid 1990ies, the insecurity of DES was demonstrated. This spurred
improvements especially for high security critical applications.
(a) What is effective DES key length? what is the DES key space?
(b) Triple DES, TDES or Triple Data Encryption Algorithm, TDEA
consists in applying DES three times with three keys
TDESK3 ,K2 ,K1 (x) = DESK3 DESinv
K2 DESK1 (x)
• Public Keys?
• RSA
2
5
6
9
10
13
14
1
2
5
6
9
10
13
14
17
18
21
22
25
26
29
30
the standard (IBM in the case of DES) this standard is the result of
128 Bit-Block (16-Byte) 256 Bit-Block (32 Byte)
Wie oben ersichtlich, wird die Funktion Round() N mal ausgeführt. Wobei N von
der Schlüssel- und der Daten-Block-Größe abhängt. Die folgende Tabelle stellt
die Länge des Schlüssels der Länge des Datenblockes gegenüber und gibt für jede
Kombination eine Anzahl von Runden an. Alle fett dargestellten Fälle sind durch
Section 5: Cryptography 55
−R
Q
P
x
a = −3, b = 5
Problem 57. Elliptic curves E = Ea,b (R) over R are unfit for cryp-
tographic purposes. Instead one uses elliptic curves E = Ea,b (F) over
some finite field F, e.g. F = GF(p) for prime p.
(a) How is P + Q to be defined on E = Ea,b GF(p) ?
6. Compression
Problem 60.
If the (relative) frequencies of the symbols in a text are known a
priori then one can design a code so that the most frequent symbols
are assigned the shortest codes. Let us call such codings monotonous.
To save the insertion of a special character to separate codes it is
necessary that each code cannot be confused with the beginning of
another code: The coding has to be prefix- or comma-free.
(a) Given an alphabet s1 , s2 , . . . , sn with frequency fi of symbol si ,
where f1 > f2 > . . . > fn for i = 1, . . . , n. Assume ci = code(si ) =
01i−1 ∈ {0, 1}i . What about this code?
(b) How to represent prefix-free codings by graphs?
(c) Construct a monotonous prefix-free coding.
Section 6: Compression 61
• Using Dictionaries
Problem 61.
The idea of LZW14 is to let sender and receiver set up and maintain
a dictionary for characters and combination of characters to be sent
and received.
(a) Both in compression and decompression, first the dictionary is ini-
tialized with the letters of the alphabet together with their codes.
Then, plain text resp. compressed text is read character by char-
acter.
In compression, the text is read character by character. PATTERN
is the longest string in the dictionary which coincides with the
recently read input characters. In decompression the codes are
read. At the same time, the dictionary is accordingly extended.
14 Jacob Ziv and Abraham Lempel: A Universal Algorithm for Sequential Data
Compression; IEEE Transactions on Information Theory, May 1977
Terry Welch, ”A Technique for High-Performance Data Compression”, Computer,
June 1984
Section 6: Compression 62
Problem 62.
(a) In an urn there are three cards: one is on both sides red, one on
both sides blue, and the third one is on one soide red and on one
side blue.
What is the probability P that a card drawn at random from the
urn is red on the top side and blue on the bottom side?
(b) In a contest there are three doors behind which two goats and a
car are hidden (the quizmaster knows where).
The candidate chooses a door. Then the quizmaster reveals a goat
behind another door.
Does the candidate improve the chances to win the car by revising
her/his initial choice?
Section 7: Probability & Intuition 65
Problem 63.
(a) What are characteristics of random numbers besides being seem-
ingly random (whatever this might be)? How to generate random
numbers with such given characteristics from random numbers of
some standard?
(b) How to generate standard random numbers fast, i.e. by little com-
putational effort?
(c) xn+1 = (a xn + c) mod m, mit xo = 1
is periodic – why? and with which maximal/minimal periodic
length?
Section 7: Probability & Intuition 66
• What is Randomness?
Criteria for the quality of pseudo random number generators have to
be established, especially of generators of evenly distributed, contin-
uous pseudo random numbers in the unit interval. These criteria are
to be assessed in tests.
But, randomness has no definition, no specification. Therefore, there
can be tests only for certain features of randomness.
Problem 64.
(a) How to test whether the co-domain is evenly covered?
(b) How to test randomness of pseudo random numbers by measuring
the information content of each generated digit?
(c) How to test randomness of pseudo random numbers by measuring
their compressability?
(d) How to test randomness of pseudo random numbers by measuring
the mutual (in) dependece of their digits?
67
Solutions to Problems
Problem 1(a)
4 = (5 − 3) + (5 − 3)
Solutions to Problems 74
Problem 1(b)
1=3+3−5
Solutions to Problems 75
Problem 1(c)
For example, 5 = 9 − 4, 3 = 4 + 4 + 4 − 9, . . .
Solutions to Problems 76
Problem 1(d)
There is no solution.
Solutions to Problems 77
Problem 2(a)
This is the height he achieves each day:
At the 1st day he reaches 300m, in the 1st night back to 100m
at the 2nd day he reaches 400m, in the 2nd night back to 200m
at the 3rd day he reaches 500m, in the 3rd night back to 300m
...
at the 27th day he reaches 2900m, in the 3rd night back to 2700m
at the 28th day he reaches 3000m
Solutions to Problems 78
Problem 2(b)
A needed tA time units, TU for the 100m. Hence his speed is vA =
100/tA .
B needed tB TU for the 100m. Hence his speed is vB = 100/tB =
90/tA . Therefore tA /tB = 0.9.
The speed of C is vC = 90/tB = x/tA . Therefore x = 90tA /tB =
90 · 0.9 = 81m.
Thus, the first runner A beats C by 19m.
Solutions to Problems 79
Problem 3(a)
36 = 22 · 32 . If one considers also the one year olds, then there are
the following combinations:
P
3. 2. 1.
1 1 36 38
1 2 18 21
1 3 12 16
1 4 9 14
1 6 6 13
2 2 9 13
2 3 6 11
3 3 4 10
Only in case of sum 13 another hint was necessary. But there is an
oldest child only if the family has two years old twins and a nine years
old child.
Solutions to Problems 80
ments.
The point in time of the catastrophe is
∞
X 1 5
t∞ = 4 0.2i = 4 −1 =4 −1 =1
i=1
1 − 0.2 4
and the total travelled distance
4 4 4
75 + 75 + 75 . . . = 75km.
5 25 125
Solutions to Problems 82
Problem 5(a)
Let sh (t) and sr (t) denote the distance travelled along the outward
journey and the return journey resp., at any point t in time between
sunrise 0 and sunset 1.
Let d denote the total distance between A and B. Then, sh (0) = 0,
sh (1) = d, sr (0) = d, sr (1) = 0.
With sh and sr also δ(t) = sr (t) − sh (t) is a continuous function of t.
Because of the different signs of δ(0) = d and δ(1) = −d the function
δ(t) has at least one zero to in the intervall [0, 1].
At time to we have sr (to ) = sh (to ).
Under which conditions are there more than one such point?
Solutions to Problems 83
Problem 6(a) There are eight equations with nine unknowns. And,
the solutions have to consist of the natural numbers 1,. . . ,9.
Stepwise pick the arrangements corresponding to magic squares from
a total of 9!=362880 arrangements.
1. The number in the middle/centre is necessarily 5.
It cannot be n = 6, 7, 8 or 9 because then m = 9, 8, 7 or 6 had
no place in the magic square.
2. The 9 is in no corner, neither in NO, NW, SW, nor SO.
Assuming NW=9 the SO=1 and for the three numbers 6,7 and
8 there would be left only the two positions O and S.
3. Without restriction of generality let W=9, then either NW=2
and SW=4 or NW=4 and SW=2.
Assuming now NW=3.Then also SW=3. But the number 3
must not appear twice.
Two of the eight possible magic squares – identical when taking sym-
metry into consideration – are presented
Solutions to Problems 84
2 7 6 4 3 8
9 5 1 und 9 5 1
4 3 8 2 7 6
How do the other six magic squares look like?
Solutions to Problems 85
Problem 7(a)
This text has no letter e, but every other letter of the Latin alphabet
occurs at least once.
Write a similar text in German.
Solutions to Problems 86
Problem 8(a)
With the following procedure he acquires the average salary without
him or any of his employees getting to know an individual salary.
1. He at random chooses a big ’secret’ number k.
2. He tells k to the first employee in order to increment k by her/his
own salary and to tell the sum to the second employee.
3. One after another the employees get to know some number in
order to increment it by their own salary and to tell the sum to
the next colleague.
4. The last nth employee increments the number by her/his salary
and tells the sum g to the boss.
Then, the average salary is (g − k)/n.
Solutions to Problems 87
Problem 9(a)
The problem is to let Alice get at the content of the box. The two
agree on the following procedure:
1. Bob sends the box locked by his lock to Alice.
2. Alice additionally locks the box she received by her lock and
sends it back to Bob.
3. Bob removes his lock from the box and sends the box locked by
only Alice’s lock back to Alice.
Solutions to Problems 88
Problem 10(a)
They agree – say per e-mail – on the following procedure:
1. Alice and Bob agree to use a suitable one way function f , i.e. a
one–to–one function f : N ⊃ D → W ⊂ N, so that f (x) is easily
and f inv (y) is extremely hard to compute.
2. Now, say Alice starts and chooses an odd or even x ∈ D. Now
she sends y with y = f (x) to Bob without offenbaren x.
3. Bob receives y and bets whether x was odd or even.
(If he wins then Alice otherwise Bob has to drive.)
4. Alice checks Bob’s bet and sends x to Bob for verification, i.e.
to let Bob compare f (x) with the y he initially received.
Solutions to Problems 89
Problem 11(a)
They need three locks with two keys each. If each person owns keys
according to the following scheme,
Alice PP lock 1
PPP
P
PPP
Bob PP lock 2
PP
PP
PP
Claire P lock 3
then only at least two persons together have keys for all three locks
of the treasure box.
Solutions to Problems 90
Problem 11(b)
The following schema represents a solution
Alice Q
PP lock 1
QPPP
Q P
QPPP
Bob Q PP Q lock 2
Q
P PPQ
QQ PQPQ
Claire lock 3
PQ
P
PP Q
PP Q
PPQ
PQ
Dennis lock 4
PQ
P
because one person is always lacking a key, and any two persons to-
gether have a key to each of the four locks.
Is this solution with four locks with three keys each minimal?
With three locks each person may have at most two keys. Hence there
are a total of at most eight keys for three locks and for four persons:
Solutions to Problems 91
There is no lock with only one key, because without the owner of that
one key pairs of persons cannot open the treasure box.
Hence there is either one person with keys to four locks or there are
two persons with keys to three locks. In both cases a contradiction!
Finally with four locks, it is not sufficient to have two keys per person
because then any two persons together might not have keys to each
of the four locks!
Solutions to Problems 92
Problem 12(a)
Solutions to Problems 94
Problem 12(b)
Solutions to Problems 95
Problem 12(c)
Solutions to Problems 96
Problem 12(d)
Solutions to Problems 97
Problem 13(a)
Let (x, y) be the state of the system with x litres in the four litre and
y litres in the nine litre bucket. Then the follwing state transitions
are possible.
(0, 0) → (0, 9) → (4, 5) → (0, 5) → (4, 1) → (0, 1) → (1, 0) → (1, 9) →
(4, 6)
Solutions to Problems 98
Problem 13(b)
(0, 0) → (3, 0) → (0, 3) → (3, 3) → (1, 5) → (1, 0)
Solutions to Problems 99
Problem 13(c)
Let (x, y, z) be the state of the system with x litres in the 8 litre
canister, y litres in the 5-litre and z litres in the 3-litre jug. Then the
follwing state transitions are possible.
(8, 0, 0) → (5, 0, 3) → (5, 3, 0) → (2, 3, 3) → (2, 5, 1) → (7, 0, 1) →
(7, 1, 0) → (4, 1, 3)
Solutions to Problems 100
Problem 13(d)
The barrel should contain 9 litres, the bucket 6 litres and the jug 3
litres. The can is empty. Let (w, x, y, z) be the state of the system
with w litres in the barrel, x litres in the bucket, y litres in the jug and
z litres in the can. Then the follwing state transitions are possible.
(18, 0, 0, 0) → (10, 8, 0, 0) → (10, 6, 0, 2) → (10, 6, 2, 0) → (7, 6, 5, 0) →
(7, 6, 3, 2) → (9, 6, 3, 0)
Solutions to Problems 101
Problem 14(a)
Let f , m, c1 and c2 denote ages of father, mother, oldest child and
youngest child resp. Then we know
a) f + m + c1 + c2 = 124
b) f + m = 3(c1 + c2 )
c) m > 2c1
d) f − m = 9(c1 − c2 )
a) and b) give c1 + c2 = 31 und f + m = 93 sowie 2f = 93 + 9(c1 − c2 )
or 2m = 93 − 9(c1 − c2 ). In any case c1 − c2 is odd.
If c1 − c2 = 1 then c1 + c2 = 31 implies c1 = 16 and c2 = 15 as well
as m > 32. From f + m = 93 and f − m = 9 we conclude f = 51 and
m = 42 > 32. This is the only solution.
Namely, if otherwise c1 − c2 ≥ 3 then c1 + c2 = 31 implies c1 ≥ 17
and c2 ≤ 14 as well as m > 34. From f + m = 93 and f − m ≥ 27 we
conclude f ≥ 60 and m ≤ 33, a contradiction.
Solutions to Problems 102
Problem 14(b)
E = 24 = 2(A − d) where E − d = A = 24 − d so that 12 = A − d =
2A − 24 and thus A = 18.
Solutions to Problems 103
Problem 14(c)
In any case, one has to pay (1 − 51 )(1 + 15
100 ) = 4 23
5 20 = 23
25 -fold or 92%
of the netto-price.
Solutions to Problems 104
Problem 14(d)
2
Solutions to Problems 105
Problem 14(e)
F − 5 = 2(P − 6) F − 2P = −7) P = 14
⇒ ⇒
F + 9 = 3(P − 4) F − 3P = −21 F = 21
Solutions to Problems 106
Problem 15(a)
11 18
27
Let A, B, and C the labels of the three vertices. From
A∗B 27
B+C 18
A+C 11
we conclude B − A = 7 and thus B = 17, A = 10 and C = 1. In
general there is only a system of linear equations to solve.
Solutions to Problems 107
Problem 15(b)
From (30 − a) + (7 − a) = 34 − a we get 3 = 3a and hence a = 1.
Solutions to Problems 108
Problem 15(c)
g1 + g2 + g2 = 10, g2 = 34 g1 , g3 = 34 g2 ⇒ g1 + 34 g1 + 43 43 g1 = 10 = 10
3 g1
⇒ g1 = 3, g2 = 4, g3 = 3.
Solutions to Problems 109
Problem 15(d)
k + ` + m + n = 79 and ` + 1 = 2k and m + 1 = 2` and n + 1 = 2m
imply 79 = k + 2k − 1 + 2` − 1 + 2m − 1 = 3k − 3 + (4k − 2) + (4` − 2) =
7k − 7 + (8k − 4) = 15k − 11 and thus 15k = 90, therefore k = 6,
` = 11, m = 21, and n = 41.
Solutions to Problems 110
Problem 15(e)
Let m and d be the number of sacks the mule and the donkey carry
resp. Then m + 1 = 2(d − 1) and m − 1 = d + 1 imply m = 7 and
d = 5.
Solutions to Problems 111
Problem 16(a)
U = 2πr = πr2 = A ⇒ r = 2
Solutions to Problems 112
Problem 16(b)
Let ` [m] be the length and v [m/sec] the speed of the train. We know
` = 7v and 330 = (18 − 7)v, hence v = 30 [m/sec] and ` = 210 [m].
Solutions to Problems 113
Problem 16(c)
In total, he worker produces x parts. To produce the first half it takes
x x
20 days, to produce the second half it takes 60 days. On average, he
x 60
produces x/20+x/60 = 4 = 15 parts per day.
Solutions to Problems 114
Problem 16(d)
n = d3 103 + d2 102 + d1 10 + do is palindromial ⇐⇒ n = do 103 +
d1 102 +d1 10+do . For such n we have 11|n = 1000do +110d1 +do ⇐⇒
n|1001do = 11 · 91do .
Solutions to Problems 115
Problem 16(e)
I, a man, 7 wives, 72 sacks, 73 cats, 74 kids, i.e.
P4 5
−1
1+ i=o 7i = 1+ 77−1 = 1+ 16 (823543−1) = 1+137257 = 137258
Solutions to Problems 116
Problem 16(f )
4 4 3 1 3
4 = 3 4 = (1 + 3 ) 4
Solutions to Problems 117
Problem 17(a)
One cat catches 1 mice in 5 minutes. One cat cathes 20 mice in 100
minutes. Five cats catch 100 mice in 100 minutes.
Solutions to Problems 118
Problem 17(b)
Let 6 ≤ a, b ≤ 10 for a, b ∈ N. Then, in general we have
10(a−5+b−5)+(10−a)(10−b) = 10(a+b)−100+100−10(a+b)+ab = ab
Solutions to Problems 119
Problem 17(c)
One hen lays one egg in one and a half days. Seven hens lay seven
eggs in one and a half day. Seven hens lay 28 eggs in six days.
Solutions to Problems 120
Problem 17(d)
Let the type denote at the same time the weight. Then we have
A = 2B, B = 3C, C = 5D ⇒ A = 2B = 6C = 30D.
Solutions to Problems 121
Problem 17(e)
Because of the prime factorization 5291 = 11 · 13 · 37 und 3913 =
7 · 13 · 43 the twins are a 13 year old girl and a 13 year old boy.
Solutions to Problems 122
Problem 18(a)
One cat catches 1 mice in 5 minutes. One cat cathes 20 mice in 100
minutes. Five cats catch 100 mice in 100 minutes.
Solutions to Problems 123
Problem 18(b)
One must not divide by 0.
Solutions to Problems 124
Problem 18(c)
Let n be the numerator and d be the denominator. The we have
n n+65 n
d = d+5 ⇒ 5n = 65d ⇒ n = 13d ⇒ d = 13.
Solutions to Problems 125
Problem 18(d)
The numbers are n, n + 1, n + 2, n + 3, n + 4 for some n ∈ N. Then we
have n2 + (n + 1)2 + (n + 2)2 = (n + 3)2 + (n + 4)2√⇒ 3n2 + 6n + 5 =
2n2 + 14n + 25 ⇒ n2 − 8n − 20 = 0 ⇒ n1,2 = 4 ± 36 ⇒ n = 10.
Solutions to Problems 126
Problem 18(e)
Let b be the (price of the) bottle and w of the wine. Then b + w = 9
and w = b + 8 imply 2b + 8 = 9 or b = 21 Euro.
Solutions to Problems 127
Problem 18(f )
x x x
Let x be the area of his land. Then we have 3 + 4 + 5 + 26 = x ⇒
47 13
60 x + 26 = x ⇒ 60 x = 26 ⇒ x = 120.
Solutions to Problems 128
Problem 18(g)
There are 8 saussages and each person eats 83 saussages. Egon pays
for his 83 saussages 8 Euro. Therefore a saussages costs 3 Euro. Hence,
Heini gets for the 3 − 83 = 13 saussages he has not eaten himself 1 Euro
and Carl gets for the 5 − 38 = 37 saussages he has not eaten himself
7 Euro.
Solutions to Problems 129
Problem 18(h)
1 1 1 9+6+2 17
+ + = =
2 3 9 18 18
Thus, the oldest son gets 9 cows, the middle one 6 cows and the
youngest son 2 cows. The moderating neighbour, the 18th person,
gets no cow.
Solutions to Problems 130
Problem 19(a)
time this side bridge other side time this side bridge other side
00 ABCD 00 ABCD
BC →AD→ CD →AB→
25 BC AD 10 CD AB
BC ←A← D CD ←A← B
30 ABC D 15 ACD B
B →AC→ D A →CD→ B
50 B ACD 40 A BCD
B ←A← CD A ←B← CD
55 AB CD 50 AB CD
→AB→ CD →AB→ CD
65 ABCD 60 ABCD
The left plan obviously does not work. However, it saves time to let
C and D together cross the bridge. But the two must not be the first
to let somebody faster return the torch.
Solutions to Problems 131
Problem 20(a)
Solutions to Problems 132
Problem 20(b)
Put the right most coin on top on the coin at the intersection of the
two rows.
Solutions to Problems 133
Problem 20(c)
Solutions to Problems 134
Problem 20(d)
The ith vassal has to contribute to the weighing i coins. If allP30would
pay in 10g coins then the contributions would amount to 10 i=1 i =
10 30·31
2 = 150 · 31g coins. Now, if the jth vassal contributes 9g coins
then this will lead to a deficit of exactly jg coins, thus convicting the
jth vassal.
Solutions to Problems 135
Problem 21(a)
P
time farmers blacksmith apprentice
0 30 30
1 30 30
2 25 5 30
3 3 25 2 30
bezahlt 27 bekommen 25 behalten 2 30
One must not mix debit and credit.
Solutions to Problems 136
Problem 21(b)
Construct a regular tetraeder in space (!).
Solutions to Problems 137
Problem 21(c)
7 8
9 10
3 5 6 4
Solutions to Problems 138
Problem 21(d)
Interchanging rows or columns leaves the number of bottles in rows
or columns unchanged. Hence, we can assume that rows and columns
are ordered according to descending number of bottles.
Then, the number of rows with six bottles must be even, namely two.
The remaining two bottles produce odd columns if put into a row,
and odd rows if put into a column.
The number of rows with four bottles is even, namely two. The re-
maining six bottles similarly produce odd rows or columns necessarily.
It is not possible to store 14 bottles in the tray in rows with only two
bottles.
Solutions to Problems 139
Problem 22(a)
The last but two factor is (x−x). This implies (x−a)(x−b) . . . (x−z) =
0.
Solutions to Problems 140
Problem 22(b)
The arrow indicates the viewing direction. The new positions are
shown. Horizontally and vertically horizontal and vertical arrows al-
ternate. Thus, the intended position/orientation is not achievable.
Solutions to Problems 141
Problem 22(c)
Opposite corner squares have the same color. Removing these squares
causes the number of black and white squares to differ. But, a domino
piece covers always exactly one white and one black square. Therefore,
the modified chess board cannot be covered by domino pieces.
Solutions to Problems 142
Problem 22(d)
n = 10t + 5 ⇒ n2 = 100t2 + 100t + 25 = 100t(t + 1) + 25.
Solutions to Problems 143
Problem 23(a)
No, the inner cuboid has no face on the outside. To cut it one needs
six cuts. So six is the minimum number of cuts.
Solutions to Problems 144
Problem 23(b)
One needs for one floor c1 = 2, for two floors c2 = c1 + 1 + 2 · 2 = 7
and for three floors c3 = c2 + 2 + 2 · 3 = 15 cards, hence in general
ci = ci−1 + (i − 1) + 2i = ci−1 + 3i − 1 with c1 = 2. The assumption
ci = Ai2 + Bi + C gives ci = 32 i2 + 12 i, especially c47 = 32 472 + 12 47 =
1
2 47(3 · 47 + 1)47 · 71.
Solutions to Problems 145
Problem 23(c)
?
Solutions to Problems 146
Problem 23(d)
?
Solutions to Problems 147
Problem 24(a)
There cannot be two black flags because the captive seeing the two
black flags would have instantenously concluded that the flag behind
must be white.
Hence there also cannot be a single black flag because the two captives
seeing the one black flag would have instantenously concluded that
the flags behind them must both be white. So after a while they
unanimously conclude that behind them there are only white flags.
Solutions to Problems 148
Problem 25(a)
Let C, T , W , M denote the number of children, twens, women, and
men resp. Then we have: 2C = T , 2W = M , 3C + 3W = C + T +
W + M = 81 und 2 · 3C = 2(C + T ) = W + M = 3W , also 2C = W
und daher C = 9, T = 18 = W , M = 36.
Solutions to Problems 149
Problem 25(b)
FFFEEE
Take the second full glas and empty it into the second empty glas.
Solutions to Problems 150
Problem 25(c)
= √
d.h. 1 = 1
Solutions to Problems 151
Problem 25(d)
With a), b) and f) we have
personnel J M B
job 6= fireman
travellers Dr. J Dr. M Dr. B
income 5000Euro/Monat
residence Ch-burg
5000 is not divisible by 3. Hence, Dr. J is no neighbour of the conduc-
tor who lives in (Ch.+N)/2 and not in N so that Dr. J lives neither in
Ch. nor in (Ch.+N)/2. Because of e) Dr. J lives in N. Also, Dr. M is
neighbour of tghe conductor. Because of e) the name of the conductor
is J. Therefor, the name of the is B.
personnel J M B
job conductor 6= fireman engine driver
travellors Dr. J Dr. M Dr. B
income 5000Euro/month
residence N (Ch+N)/2 Ch
Solutions to Problems 152
Problem 25(e)
Let the number of lizards, beetles and worms be L, B, and W resp.
We have L + B + W = 12. Lizards got four and beetles got six legs.
Worms got no legs. Hence, 4L + 6B = 26 implies B ∈ {1, 3}.
If B = 1, then L = 5 and W = 6 = L + B which is excluded because
of W > L + B.
If B = 3, then L = 2 and W = 7 > L + B.
Solutions to Problems 153
Problem 25(f )
One after another we get the following jobs:
Joe Hans Klaus
gardener 6= musiscian, 6= gardener 6= gardener
musician
chauffeur painter
merchant
barber
Solutions to Problems 154
Problem 25(g)
Martin
Bettina
Pieper
Solutions to Problems 155
Problem 26(a)
There is 12 = 1 square with side length 8.
There are 22 = 4 squares with side length 7.
There are 32 = 9 squares with side length 6.
...
There are 88 = 64 squares with side length 1.
P8
In total, there are i=1 i2 = n(n+1/2)(n+1) = 8·8.5·9
= 24 17
2 =
3 3
n=8
12 · 17 = 204 squares.
Solutions to Problems 156
Problem 26(b)
Solutions to Problems 157
Problem 26(c)
???
Solutions to Problems 158
Problem 27(a)
Solutions to Problems 159
Problem 28(a)
At t = 0 start both sand glasses. At t = 7 turn both sandglasses.
After 4 min, i.e. at t = 11 the 11-min sand glass is drained. Turn the
7-min sand glass, in order to measure the rest 4 min.
Solutions to Problems 160
Problem 29(a)
The clock is late 6min/24 = 1/4min = 15sec per hour, i.e. in 24 +
20 = 44 hours it is 11 min late and at 8h it shows 7:49h.
Solutions to Problems 161
Problem 29(b)
For the third woman is exactly one bread left: she buys half of it and
another half so that all bread is sold.
For the second woman there are three breads left: she buys one and
a half and another half leaving the one bread for the third woman.
For the first woman there are seven breads left: she buys three and a
half and another half leaving the three breads for the third woman.
The baker has sold seven loafs of bread.
Solutions to Problems 162
Problem 29(c)
A quarter of an hour has 15 · 60 = 900 seconds. The stamp tool print
numbers 0 to 899 in the first to the 900th second. The sequence 0,1,
. . . , 99 contains 10+10=20 ones. The sequence 100, 101, . . . , 199
contains 120 ones. In total, the stamp tool prints 280 ones.
Solutions to Problems 163
Problem 30(a)
For the number n of campainers we have n mod 2 = 1, n mod 3 = 2,
. . . n mod 10 = 9. And the chinese remainder theorem produces n =
2519, s.a.
www.arndt-bruenner.de/mathe/scripts/chinesischerRestsatz.htm
Solutions to Problems 164
Problem 30(b)
Let S and B be the number of sisters and brothers resp.
S − 1 = B, S = 2(B − 1) ⇒ B = 3, S = 4.
Solutions to Problems 165
Problem 30(c)
Let A and B be the age of the first and the second sister resp. Then,
we have
A − B = 4, A3 − B 3 = 988 = (A − B)(A2 + AB + B 2 )
⇒ A2 + AB + B 2 = A2 + A(A − 4) + (A − 4)2 = 247
⇒ 3A2 − 12A − 231 = 0
⇒ A2 − 4A − 77 = 0 ⇒ A = 11, B = 7.
Solutions to Problems 166
Problem 31(a)
There are n cows, n pigs, n horses and n rabbits of which survived 54 n
cows, 45 n pigs, 15 n horses and r n rabbits. The we have 14
5 rn
= 9 n+r n
=
5
r
9 , hence 9 + 5r = 14r and therefore r = 1, so that no rabbit died.
5 +r
Solutions to Problems 167
Problem 32(a)
Let B be the price of the bottle and W be the price of the wine. Then
we have 9 = F + W = F + (F + 8) = 2F + 8, i.e. 2F = 1 and hence
F = 12 .
Solutions to Problems 168
Problem 32(b)
Each son has to get the amount of 13 (10 + 5) = 5 barrels full of wine.
Fill half the wine of each of the full barrels into one of the empty
barrels. Then we have 30 half empty barrels and each son gets 10 of
them.
Solutions to Problems 169
Problem 34(a)
For example,
E(41) = 1681 = 412
and similarly
E(42) = 1763 = 41 · 43.
To carry on s.a. www.weblearn.hs-bremen.de/risse/MAI/,
www.cs.unb.ca/profs/alopez-o/math-faq/math-faq.pdf
Solutions to Problems 171
Problem 35(a)
Namely, M (11) = 2047 = 23 · 89.
The Lucas16 -Lehmer17 -test, s. e.g. (3.2.8 What is the current status
on Mersenne primes?) of
www.cs.unb.ca/profs/alopez-o/math-faq/math-faq.pdf tests ef-
ficiently whether a Mersenne number is prime or not. 1999 a record in
the Great Internet Mersenne Prime Search (GIMPS), was established
showing that M (6972593) – a number with 2098960 digits – is prime.
Everybody can provide idle cycles of PC’s to compute prime Mersenne
numbers, s. Great Internet Mersenne Prime Search (GIMPS)
GIMPS runs many more projects of distributed computing.
Problem 36(a)
It is the (n mod 7)th day of the week if we arrange the days of the
week cyclically numbered from 0 to 6 starting with todays day of the
week.
Solutions to Problems 173
Problem 36(b)
It is the ((7 − (n mod 7)) mod 7)th day of the week if we arrange the
seven days of the week cyclically numbered from 0 to 6 starting with
todays day of the week.
Solutions to Problems 174
Problem 36(c)
E.g. see
www.cl.cam.ac.uk/~mgk25/iso-time.html
Solutions to Problems 175
Problem 37(a)
Per definition we have for m, n, r ∈ N
n mod m = r ⇐⇒ n = v · m + r für ein v ∈ N
⇐⇒ n − r = v · m für ein v ∈ N
⇐⇒ m|n − r ⇐⇒ n ≡ r (mod m)
Solutions to Problems 176
Problem 37(b)
additivity:
n1 ≡ r1 (mod m) ⇒ n1 − r1 = v1 m
n2 ≡ r2 (mod m) ⇒ n2 − r2 = v2 m
(n1 ± n2 ) ≡ (r1 ± r2 ) (mod m) ⇐ n1 + n2 − (r1 + r2 ) = (v1 + v2 )m
multiplicativity:
m|n1 − r1 m|r2 (n1 − r1 )
ni ≡ ri (mod m) ⇒ ⇒ ⇒
m|n2 − r2 m|n1 (n2 − r2 )
m|r2 (n1 − r1 ) + n1 (n2 − r2 ) = n1 n2 − n1 r2 + n1 r2 − r1 r2
⇒ n1 · n2 ≡ r1 · r2 (mod m)
Solutions to Problems 177
Problem 37(c)
scalar multiples
n ≡ r (mod m) ⇒ m|n − r ⇒ m|c(n − r) ⇒ c · n ≡ c · r (mod m)
√
powers either by multiplicativity or directly by induction: p=1
which leaves us to show np ≡ rp(mod m) ⇒ np+1 ≡ rp+1(mod m)
m|rp (n − r)
n ≡ r (mod m) m|n − r
⇒ ⇒ ⇒
np ≡ rp (mod m) m|np − rp m|n(np − rp )
m|rp (n − r) + n(np − rp ) = np+1 − nrp + nrp − rp+1
⇒ np+1 ≡ rp+1 (mod m)
Solutions to Problems 178
Problem 37(d)
transitivity
r ≡ s (mod m), s ≡ t (mod m) ⇒ m | r − s, m | s − t
⇒ m | (r − s) + (s − t) = r − t ⇒ r ≡ t (mod m)
Solutions to Problems 179
Problem 38(a)
Division by 3: (due to exponentiation)
10o = 1 ≡ 1 (mod 3) ⇒ 10p ≡ 1 (mod 3)
and (due to multiplicativity)
∞
X ∞
X
zi 10i = zi ≡ 1 (mod 3) ⇒ n = zi 10i ≡ zi (mod 3)
i=0 i=0
Specially we have
s(n) ≡ 0 (mod 3) ⇒ n ≡ 0 (mod 3)
Problem 38(b)
Remainders when dividing powers of 10 by 11:
10o ≡ 1 (mod 11)
2i
10 ≡ 1 (mod 11)
⇒
101 ≡ 10 (mod 11) 102i+1 ≡ 10 (mod 11) ≡ −1 (mod 11)
Arithmetic modulo 11 gives
z2i 102i ≡ z2i (mod 11) and z2i+1 102i+1 ≡ −z2i+1 (mod 11)
Together with transititvity we get a test for the divisibility by 11:
∞
X ∞
X
11 | (−1)i zi ⇒ 11 | zi 10i
i=o i=0
and e.g.
1234567890 mod 11 = (−1 + 2 − 3 + 4 − 5 + 6 − 7 + 8 − 9 + 0) mod 11 =
−5 mod 11 = 6
Solutions to Problems 181
Problem 38(c)
Some examples may illustrate the procedure:
Check digit of ISBNumber 1-86197-222 is 1-86197-222-9 because
1·1+2·8+3·6+4·1+5·9+6·7+7·2+8·2+9·2 = 174 mod 11 = 9 mod 11
www.cs.cornell.edu/Courses/cs722/2000sp/ReedSolomon.pdf
...
hotwired.lycos.com/synapse/feature/97/29/silberman2a 1.html
Solutions to Problems 185
Problem 39(a)
Let a < b (otherwise there is nothing to do).
Let b = va + r with r = b mod a.
If r = 0 then gcd(a, b) = a and gcd(a, (va) mod a) = gcd(a, 0) = a.
If r > 0 then for d = gcd(a, r) we have d | a and d | r and therefore
also d | b = va + r.
It remains to show that d is greatest divisor of a and b. For
a d0 ∈ N with d0 | a and d0 | b = va + r it follows d0 | r. Due to
d = gcd(a, r) we have d0 | d.
In total gcd(a, r) = d = gcd(a, b) is deduced.
Solutions to Problems 186
Problem 39(c)
Proof of FLT see e.g. [25] S.54-55
If p is prime then G = (Z/pZ)∗ = {1, 2, . . . , p − 1} is a multiplicative
group with p − 1 elements (i.e. closed under multiplication modulo p
with unit 1), hence a group of order ord(G) = p − 1.
Each x ∈ G generates a subgroup < x >= {x1 , x2 , . . .} in G ⊃< x >.
As G can be represented as disjoint union of the coset classes g < x >
(with identical cardinality |g < x > | for all g ∈ G) we have – as for
each subgroup H of a group G –
ord(x) = ord(< x >) | ord(G)
For a ∈ G, i.e. relative prime to p we have v · ord(a) = ord(G) and
thus
ap−1 = aord(G) = av·ord(a) = (aord(<a>) )v = 1v = 1
representing Fermat’s little theorem.
ap−1 ≡ 1 (mod p)
Solutions to Problems 188
ˆ = (mod 11111 )
ˆ ≈20
Problem 39(d)
The implication is equivalent to FLT with p = n and a = 2.
FLT: 2n−1 ≡ 1 (mod n) ⇒ 2n−1 − 1 ≡ 0 (mod n) ⇒ n|2n−1 − 1.
Problem 40(a)
Let |M | denote the cardinality of a set M , i.e. the numebr of elements
of M , then obviously
ϕ(p) = |{m ∈ N : m < p, gcd(m, p) = 1}| = |{1, 2, . . . , p − 1}| = p − 1
ϕ(n) is easily evaluated For small arguments n:
n ϕ(n) n ϕ(n) n ϕ(n)
11 10 21 12
2 1 12 4 22 10
3 2 13 12 23 22
4 2 14 6 24 8
5 4 15 8 25 20
6 2 16 8 26 12
7 6 17 16 27 18
8 4 18 6 28 12
9 6 19 18 29 28
10 4 20 8 30 8
Solutions to Problems 191
Problem 40(b)
It is to be shown that there are pk−1 − 1 different m < pk with a
common divisor with pk , i.e. with at least the divisor p.
|{m = vp : m = vp < pk }| = |{m = vp : 1 ≤ v < pk−1 }| = pk−1 − 1
Hence
ϕ(pk ) = |{1, 2, . . . , pk − 1} \ {m = vp : 1 ≤ v < pk−1 }|
= |{1, 2, . . . , pk − 1}| − |{m = vp : 1 ≤ v < pk−1 }|
= pk − 1 − (pk−1 − 1) = pk − pk−1
Solutions to Problems 192
Problem 40(d)
Each n ∈ N has a prime factor decomposition
Yv
n= pvi i
i=1
where vi denotes the multiplicity of the prime factor pi and v the
number of prime factors. Therefore
Yv v
Y
vi vi −1
ϕ(n) = pi − pi =n 1 − 1/pi
i=1 i=1
but only if the prime factor decomposition of n is known at all.
If p and q are prime and n = p · q then specially
ϕ(n) = ϕ(p·q) = ϕ(q)·ϕ(q) = (p−1)(q−1) = p·q−p−q+1 = n−(p+q)+1
Solutions to Problems 194
Problem 41(a)
gcd(mi , mj ) = 1 implies gcd(bi , mi ) = 1 for i = 1, . . . , n.
Therefore, the (modulo mi )-inverse xi to bi exists, i.e.
xi bi ≡ 1 (mod mi ) for i = 1, . . . , n
Also bi xi ≡ 0 (mod mj ) if i 6= j, hence xi bi ≡ δij (mod mi ). With
n
X
x= xi bi ri
i=1
we get for j = 1, . . . , n
X n
x mod mj = (xi bi ri ) mod mj = (xj bj rj ) mod mj = rj
i=1
Solutions to Problems 196
Problem 41(b)
Obviously
x = y mod p ⇐⇒ x − y ∈ pZ ⇐⇒ p | (x − y)
x = y mod q ⇐⇒ x − y ∈ qZ ⇐⇒ q | (x − y)
Because p and q are by assumption relatively prime, we get
(pq) | (x − y) ⇐⇒ x − y ∈ (pq)Z ⇐⇒ x = y mod (pq)
Solutions to Problems 197
+ 0 1 2 · 0 1 2
0 0 1 2 0 0 0 0
1 1 2 0 1 0 1 2
2 2 0 1 2 0 2 1
Solutions to Problems 200
+ 0 1 2 3 4 · 0 1 2 3 4
0 0 1 2 3 4 0 0 0 0 0 0
1 1 2 3 4 0 1 0 1 2 3 4
2 2 3 4 0 1 2 0 2 4 1 3
3 3 4 0 1 2 3 0 3 1 4 2
4 4 0 1 2 3 4 0 4 3 2 1
Solutions to Problems 201
Problem 43(b)
Pn−1 i n
Pn−1 i n
Let r(x) = i=0 ri x ∈ GF(p ) and s(x) = i=0 si x ∈ GF(p )
with ri , si ∈ GF(p). Then
2n−2
X X i
xi
rs (x) := rj si−j ∈ P(2n − 1)
i=0 j=0
x, x + 1 and x2 .
n xn n (x + 1)n n (x2 )n
0 1 0 1 0 1
1 x 1 x+1 1 x2
2 x2 2 x2 + 1 2 x2 + x + 1
3 x2 + 1 3 x 3 x2 + x
4 x2 + x + 1 4 x2 + x 4 x
5 x+1 5 x2 + x + 1 5 x2 + 1
6 x2 + x 6 x2 6 x+1
Problem 45(a)
With k = 3 the message is decrypted to give the plain text
thisisatopsecretmessage.
Obviously there are only 26 possible keys.
Also, the Caesar-encryption/decryption preserves the letter frequen-
cies – a natural angle for an attack.
s.a. www.weblearn.hs-bremen.de/risse/MAI/docs/mai1.pdf
k=C x= B
Caesar y=
Caesar−1 x=
? Anything special about this implementation ?
Solutions to Problems 218
Problem 45(b)
Besides the trivial key 0 there are only 25 other keys k = 1, 2, . . . , 25.
Security is rather low since only 25 keys have to be tried.
Solutions to Problems 219
Problem 46(a)
Without restricting generality let k = k mod m .
Encryption has to be one–to–one, i.e.
(k x1 ) mod m = (k x2 ) mod m ⇒ x1 = x2 für alle 0 ≤ x1 , x2 < m
or equally
x1 6= x2 ⇒ (k x1 ) mod m 6= (k x2 ) mod m für alle 0 ≤ x1 , x2 < m
Then, necessarily k and m have no common divisor. Assuming oth-
erwise there was some g ∈ N with k = v g and m = w g. Hence, for
0 = x1 6= x2 = w < m
(k x1 ) mod m = 0 mod m = 0 = (v w g) mod (w g)
holds in contradiction to encryption being one–to–one.
Solutions to Problems 220
Problem 46(c)
Insertion gives
x = (k10 y + ko0 ) mod m = (k10 ((k1 x + ko ) mod m) + ko0 ) mod m
= (k10 k1 x + k10 ko + ko0 ) mod m = x
iff and only if
k10 = k1inv and ko0 = (−k1inv ko ) mod m
Then also
y = (k1 x + ko ) mod m = (k1 ((k1inv y + ko0 ) mod m) + ko ) mod m
= (k1 k1inv y + k1 ko0 + ko ) mod m
= (y + k1 (−k1inv ko ) + ko ) mod m = y
Solutions to Problems 223
Problem 46(d)
Each key consists of a pair (k1 , ko ) with ko ∈ {0, 1, . . . , m − 1} and
k1 ∈ {0 ≤ k < m : gcd(k, m) = 1}. Therefore all keys are in the space
of keys {0, 1, 2, . . . , 25} × {0 ≤ k < m : gcd(k, m) = 1}.
For example, in case of m = 26 the key space has 26 · ϕ(26) = 26 · 12
elements.
All the same, the level of security is unchanged and rather low, as the
letter frequencies are still preserved.
Solutions to Problems 224
Problem 47(a)
Using the key word key corresponding to k = 10, 4, 24, i.e. l = 3 the
decrypted message is
thisisatopsecretmessage.
Obviously there are 26l possible keys of length l. This cycle length
l can be determined by the method invented by Kasiski. Once the
cycle length is known an attack consists only of l independent Caesar-
decryptions.
k = KEY x= ABCDEFABCDEF
Vigenère y=
Vigenère−1 x=
? Anything special about this implementation ?
Solutions to Problems 225
Problem 47(b)
Each key consists of a string k of arbitrary length. Hence, each key is
contained in the key space ∪∞ l
l=1 {0, 1, 2, . . . , 25} if the Latin alphabet
is used.
Security of the Vigenère-encryption/decryption scheme is the higher
the longer the key. But the longer the key the more difficult it is
to transmit a key to all legitimate receivers without the transmission
being eavesdropped.
Highest security is achieved – however at the highest cost to transmit
the keys – if keys are used only for one time, so called one time pad,
s.a. www.fourmilab.ch/onetime/otpjs.html
Solutions to Problems 226
Problem 48(a)
Qn
There are n! = 1 · 2 · 3 · · · n = i=1 i permutations of n objects. The
Latin alphabet therefore has
26! = 403291461126605635584000000
permutations.
Solutions to Problems 227
Problem 48(b)
No, because still the frequency of character combinations is preserved
which can be used to decypher an encrypted text.
e.g. Let y = CESVLRHEESUUSLLGANOSGMIHRSTU be the en-
cryption of a German text x.
S, C, and H are – because of blocking – close together so that one
can guess the trigram SCH. The minimal block length ` is 5. For
this block length the string x improbably starts with ”ELVSCH. . . ”
or ”EVLSCH. . . ”. For ` = 6 SCH is not possible, so this block length
is disregarded. For ` = 7 we get
...SCH....SEL....ALG.....HMU...
The final position of the trigrams is not yet known; by using the
frequency of other character combinations we get
x = VERSCHLUESSELUNGSALGORITHMUS
s.a. www.kryptoanalytiker.de
Solutions to Problems 228
Problem 48(c)
Text blocks of fixed length are encrypted by pertmutation of its letters.
In the following example
htsisitapoesrcteemssga.e
pairs of plain text letters are interchanged, i.e. the permutation (2, 1)
is applied to 2-letter blocks.
There are n! permutations of n-letter blocks: the longer the blocks
the more permutations or keys there are, i.e. the more secure is the
encryption/decryption method. However at the same time the key
length grows as well as the cost of buffering messages to be encrypted
or decrypted.
Solutions to Problems 229
Problem 49(a)
40 8 48 16 56 24 64 32 39 7 47 15 55 23 63 31
38 6 46 14 54 22 62 30 37 5 45 13 53 21 61 29
P inv =
36 4 44 12 52 20 60 28 35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26 33 1 41 9 49 17 57 25
Problem 49(b)
inv
Let fK (L, R) = (R ⊕ K, L). Due to K ⊕ K = ~0 then
inv inv
fK fK (L, R) = fK (R, L ⊕ K) = (L ⊕ K ⊕ K, R) = (L, R)
as well as
inv
fK fK (L, R) = fK (R ⊕ K, L) = (L ⊕ K ⊕ K, R) = (L, R)
Problem 49(d) The look up table for each S-Box has 26 lines à 4bit,
i.e. 28 = 256bit, a total of 8 · 256 = 211 = 2Kbit for all eight S-boxes.
On the other hand, a look up table for a 32bit substitution would have
232 lines à 32bit, i.e. 32 · 4 · 230 = 128Gbit – a totally inacceptable
alternative.
Use pre-computed inverse S-boxes.
Solutions to Problems 234
Problem 50(a) DES keys are 64bit long, including 8 parity bits.
Hence, the effective length is 56bit and the key space size is 256 =
64 (210 )5 ≈ 64(103 )5 = 64 · 1015 .
Solutions to Problems 235
Problem 51(a) Public key methods are the more secure the more
difficult it is to deduce fA−1 from A and fA .
Functions fA with the following properties are suitable for public key
encryption/decryption methods:
• fA is one-to-one. (The plain text is partitioned into fixed length
blocks; fA is applied to each block.)
• fA and fA−1 are easily evaluated. (Messages are quickly en-
crypted and decrypted.)
• It is practically impossible to deduce fA−1 from fA . (En-
crypted messages can be decrypted only at astronomical cost –
at best the decryption cost can be estimated in order to scale the
encryption/decryption method according to the security needs.)
By the way, such functions are called trapdoor functions.
Solutions to Problems 239
Problem 52(a)
The text to be encrypted is partitioned into fixed length blocks so that
the (ASCII-) string can be thought of as a (big) x ∈ N with x < n.
Then fe is applied to each of these x.
Now, fe is a trapdoor function because
• fe is one–to–one on X = {0, 1, 2, . . . , n − 1}, as fd = fe−1 .
Namely
d is modulo-ϕ(n) invers to e, i.e. d e ≡ 1 (mod ϕ(n)) or
d e = v(p−1)(q−1)+1 for a v ∈ N, so that xd e = x · xv(p−1)(q−1) .
Due to Fermat’s Little Theorem, FLT for prime p and q
xp−1 = 1 mod p
de
x = x(xp−1 )v(q−1) = x · 1v(q−1) = x mod p
q−1 ⇒ de
x = 1 mod q x = x(xq−1 )v(p−1) = x · 1v(p−1) = x mod q
From xde = x mod p and xde = x mod q follows per Chinese
Remainder Theorem for p and q with gcd(p, q) = 1, i.e. a fortiori
for prime p and q
xed = x mod (pq) = x mod n
Solutions to Problems 240
p = 59 q = 71 n= 4189
e = 47 d = 1123 check&fill at random
x = This is a top secret message
RSAenc
y=
RSAdec
x=
To check e.g. gcd(e, ϕ(n)) = 1 Euclids algorithm is available.
21 D. Atkins, M. Graff, A.K. Lenstra, P.C. Leyland: The magic words are
Problem 52(b)
The security of the RSA-method rests on the difficulty to factorize
big n ∈ N with 100 and more digits.
The RSA-method is the more secure the bigger n, cp. e.g.
www.comp.mq.edu.au/courses/comp333/Lecture/
factoring and RSA 4.pdf
Solutions to Problems 242
Problem 52(c)
Let eA and eB be Alice’s and Bob’s public RSA-key with secret RSA-
keys dA and dB resp.
Then Alice only has to append to her encrypted message y = feB (x)
the digital signature y 0 = fdA (x).
Bob then decrypts the first half y of the received message to x =
fdB (y) and verifies on the basis of the second half that x and feA (y 0 )
coincide. As only Alice knows dA it is only Alice who could have
generated y 0 . Therefore Bob can be assured to have received a message
from Alice.
By the way, Alice does not need to use the whole message x to generate
the signature y 0 = fdA (x). It is sufficient to use a hash-code hash(x)
which both sender and receiver know to generate.
Typical hash-codes are for example MD4, MD5 or SHA-1.
Solutions to Problems 243
b07 7
0 0 0 1 1 1 1 1 7
b7 0
Figure 6 illustrates the effect of the SubBytes() transformation on the State.
S-Box
s0,0 s0,1 s0, 2 s0,3 s0' , 0 s0' ,1 s0' , 2 s0' ,3
The S-box used in the SubBytes() transformation is presented in hexadecimal form in Fig. 7.
s3, 0 s3,1 s3, 2 s3,3 s3,0 s3,1 s3, 2 s3,3
a value of {ed}.
y
s s
0 r , 0 1 r ,1 2 r ,3 s2 s
r4, 3 5 6 7 8 s' s'
9 r , 0 a r ,1 b r , 2c r d
,3s' s' e f
0 63 7c 77 7b f2 6b 6f c5 30 01 67 2b fe d7 ab 76
1 ca 82 c9 7d fa 59 47 f0 ad d4 a2 af 9c a4 72 c0
2 b7 fd 93 26 36 3f f7 cc 34 a5 e5S ’ f1 71 d8
S 31 15
3 04 c7 23 c3 18 96 05 9a 07 12 80 e2 eb 27 b2 75
4 09 83 s2c 0, 0 s01a
,1 s0 ,1b
2 s0 , 36e 5a a0 52 s3b
0, 0 sd6
0 ,1 sb3
0, 2 s29
0,3 e3 2f 84
5 53 d1 00 ed 20 fc b1 5b 6a cb be 39 4a 4c 58 cf
6 d0 ef s1aa ,0 s1fb
,1 s1,432 s1, 34d 33 85 45 sf9
1, 3 s02
1, 0 s7f
1,1 s50
1, 2 3c 9f a8
7 51 a3 40 8f 92 9d 38 f5 bc b6 da 21 10 ff f3 d2
x
8 cd 0c s13 s ec s 5f s 97 44 17 c4 sa7 s7e s3d s64 5d 19 73
2, 0 2 ,1 2, 2 2 ,3 2, 2 2 ,3 2, 0 2 ,1
9 60 81 4f dc 22 2a 90 88 46 ee b8 14 de 5e 0b db
a e0 32 s3a s 0a s 49 s 06 24 5c c2 sd3 sac s62 s91 95 e4 79
b e7 c8 337 ,0 3,1
6d 3,8d 2 3, 3
d5 4e a9 6c 56 3,1 3, 2
f4 3, 3
ea 3, 0
65 7a ae 08
c ba 78 25 2e 1c a6 b4 c6 e8 dd 74 1f 4b bd 8b 8a
Figure
d 70 13. b5 66 48 03 f6 0eshifts
3eInvShiftRows()cyclically 61 the
35last57 three
b9rows86 inc1
the State.
1d 9e
e e1 f8 98 11 69 d9 8e 94 9b 1e 87 e9 ce 55 28 df
f 8c a1 89 0d bf e6 42 68 41 99 2d 0f b0 54 bb 16
5.3.2 InvSubBytes() Transformation
Figure 7. S-box: substitution values for the byte xy (in hexadecimal format).
InvSubBytes() is the inverse of the byte substitution transformation, in which the inverse S-
box is applied to each byte of the State. This is obtained by applying the inverse of the affine
as is the inverse s-box 16
transformation (5.1) followed by taking the multiplicative inverse in GF(28).
The inverse S-box used in the InvSubBytes() transformation is presented in Fig. 14:
y
0 1 2 3 4 5 6 7 8 9 a b c d e f
0 52 09 6a d5 30 36 a5 38 bf 40 a3 9e 81 f3 d7 fb
1 7c e3 39 82 9b 2f ff 87 34 8e 43 44 c4 de e9 cb
2 54 7b 94 32 a6 c2 23 3d ee 4c 95 0b 42 fa c3 4e
3 08 2e a1 66 28 d9 24 b2 76 5b a2 49 6d 8b d1 25
4 72 f8 f6 64 86 68 98 16 d4 a4 5c cc 5d 65 b6 92
5 6c 70 48 50 fd ed b9 da 5e 15 46 57 a7 8d 9d 84
6 90 d8 ab 00 8c bc d3 0a f7 e4 58 05 b8 b3 45 06
7 d0 2c 1e 8f ca 3f 0f 02 c1 af bd 03 01 13 8a 6b
x
8 3a 91 11 41 4f 67 dc ea 97 f2 cf ce f0 b4 e6 73
9 96 ac 74 22 e7 ad 35 85 e2 f9 37 e8 1c 75 df 6e
a 47 f1 1a 71 1d 29 c5 89 6f b7 62 0e aa 18 be 1b
b fc 56 3e 4b c6 d2 79 20 9a db c0 fe 78 cd 5a f4
c 1f dd a8 33 88 07 c7 31 b1 12 10 59 27 80 ec 5f
d 60 51 7f a9 19 b5 4a 0d 2d e5 7a 9f 93 c9 9c ef
e a0 e0 3b 4d ae 2a f5 b0 c8 eb bb 3c 83 53 99 61
f 17 2b 04 7e ba 77 d6 26 e1 69 14 63 55 21 0c 7d
Figure 14. Inverse S-box: substitution values for the byte xy (in
hexadecimal format).
22
shift (1,4) = 1 ; shift (2,4) = 2 ; shift (3,4) = 3 . (5.4)
Solutions to Problems 248
This has the effect of moving bytes to “lower” positions in the row (i.e., lower values of c in a
Problem 54(b)
given row), while ShiftRows():
the “lowest” bytes wrap around The intorows of of
the “top” a the
block are higher
row (i.e., cyclically
values of
c in a given
shifted asrow).
indicated by the following figure: the block S is thus mapped
0 ShiftRows() transformation.
to the8 illustrates
Figure block Sthe .
ShiftRows()
S S’
Figure 8. ShiftRows() cyclically shifts the last three rows in the State.
The inverse transformation just shifts rows cyclically in the opposite
direction.
5.1.3 MixColumns() Transformation
The MixColumns() transformation operates on the State column-by-column, treating each
column as a four-term polynomial as described in Sec. 4.3. The columns are considered as
Solutions to Problems 249
s0, c 02 03 01 01 s0, c
'
'
Problem 54(c) = 01 02 03 01 s1, c The
s1, cMixColumns(): forcolumns
0 ≤ c < Nb. of a block (5.6)
are consid-
s2' , c 01 01 02 03 s2, c
' with coefficients 8
ered as polynomials in GF(2 ) and multiplied by
s3, c 03 01 01 02 s3, c
3 2 1 0
a(x)
As a result = multiplication,
of this 0x03 x the +four
0x01 xa column
bytes in + 0x01 x +
are replaced 0x02
by the x
following:
s 0′ ,c = ({02} • s0 ,c ) ⊕ ({03} • s1,c ) ⊕ s 2,c ⊕ s3,c
modulo x4 + 1. The cth column then becomes
0 s′ = s⊕ ({02} • s ) ⊕ ({03} • s ) ⊕ s
1,c 0 ,c
1,c
2 ,c 3, c
s0,c 0x02 0x03 0x01 0x01 s0,c s0,c
s ′ = s ⊕ s ⊕ ({02} • s ) ⊕ ({03} • s )
s01,c 0x01 0x02 0x03 0x01 s1,c
= A s1,c
2 ,c 0 ,c 1,c 2 ,c
3, c
0 s′ == ({03}
• s ) ⊕ s ⊕ s ⊕ ({02} • s ).
s2,c 0x013, c
0x01 0x02 0x03
0 ,c s2,c
1,c
s2,c
2 ,c 3, c
MixColumns()
s s'
s0,0 s00,,1c s0, 2 s0,3 s0' , 0 s0' 0,1,c s0' , 2 s0' ,3
s
s1, 0 s11,,1c s1, 2 s1,3 s1' ,0
s'
s1'1,1,c s1' , 2 s1' ,3
'
s2 , 0 ss2,c s2 , 2 s2 , 3 s '
ss'
s '
s2' ,3
2 ,1 2, 0 22,1,c 2, 2
'
s3, 0 ss33,,1c s3, 2 s3,3 s3' ,0 s
s3'3,1,c s3' , 2 s3' ,3
by the polynomial
a−1 = 0x0b x3 + 0x0d x2 + 0x09 x1 + 0x0e x0
or written as matrix transformation
0
s0,c 0x0e 0x0b 0x0d 0x09 s0,c s0,c
s01,c 0x09 0x0e 0x0b 0x09 s1,c = A−1 s1,c .
0 =
s2,c 0x0d 0x09 0x0e 0x0b s2,c s2,c
s03,c 0x0b 0x0d 0x09 0x0e s3,c s3,c
Solutions to Problems 251
l = round * Nb
s0,c s0' ,c
s0,0 s0,1 s0, 2 s0,3 s'
0, 0 s0' ,1' s0' , 2 s0' ,3
s1,c wl+c s1,c
s1, 0 s1,1 s1, 2 s1,3 ⊕ wl wl +1 wl + 2 wl + 3
s1' ,0 s1' ,1 s1' , 2 s1' ,3
'
s2, 0 s2s,12,c s2, 2 s2,3 s2' , 0 ss2' ,12,c s2' , 2 s2' ,3
'
s3, 0 s3s,1 s3, 2 s3,3
3,c
s3' ,0 s3s' ,13,c s3' , 2 s3' ,3
As forFigure
all XOR operations, this
10. AddRoundKey() XORstransformation is State
each column of the its own
with inverse.
a word
from the key schedule.
Problem 55(a)
p
E = E(R) = Ea,b (R) = { x, ± x3 + ax + b : x3 + ax + b ≥ 0}
Obviously, elliptic curves are plane curves which are symmetric to the
x-axis. Depending on the parameters a and b, the radicand is positive
in one intervall or in two intervalls. Correspondingly, E = E(R) =
Ea,b (R) has one or two branches. Cp. e.g.
y y y
x x x
a = −4, b = 1 a = −3, b = 5 a = 5, b = −7
√
limx→+∞ ± x3 + ax + b = limx→+∞ ±x3/2 = ±∞
Solutions to Problems 253
Problem 55(b)
Because all coefficients of x3 + ax + b are real, all zeroes xi can con-
ventiently be represented by trigonometric/hyperbolic
p means. Let
p = a/3, q = b/2, D = p3 + q 2 and P = (sgn q) |p|.
p < 0, D ≤ 0 p < 0, D > 0 p>0
β = 13 arccos Pq3 β = 13 arcosh Pq3 β = 13 arsinh Pq3
x1 −2P cos β −2P cosh
√ β −2P sinh
√ β
x2,3 2P cos(β ± π/3) P (cosh β ± i 3 sinh β) P (sinh β ± i 3 cosh β)
Solutions to Problems 254
Problem 55(c)
For the given radicand x3 + ax + b let again p = a/3, q = b/2 and
discriminant D = p3 + q 2 . The discriminant D then determines the
type of zeroes.
D >0 one real zero, two conjugate complex zeroes
D <0 three distinct real zeroes
D 6 0
= 0, q = one simple real, one double real zero
D = 0, q = 0 one triple real zero
Hence, there are no multiple zeroes if and only if
a2 b2
D = p3 + q 2 = + 6= 0
27 4
or equivalently if
108D = 108(p3 + q 2 ) = 4a2 + 27b2 6= 0
Solutions to Problems 255
Solutions to Problems 258
Problem 56(d)
Because this so defined addition obviously is commutative, it makes
E = Ea,b (R) an (additive) commutative group or a so called Abel22 ian
group.
Problem 60(a) First, this coding takes symbol frequencies into ac-
count: the more frequent a symbol to shorter its code. Second, be-
cause of code(si ) ⊂code(sj ) für i < j, this coding is not prefix-free.
Third, the symbol 0 acts as a separator of codes.
Presumably, there must be better codings.
Solutions to Problems 269
0=code(s1 )
0 1
10=code(s2 ) 11=code(s3 )
Now, if only the symbol frequencies are given, the tree has to be built
starting from the leaves. In the example above, for c1 = code(s1 ) to
be shortest, necessarily f1 ≥ f2 + f3 holds. This can be generalized:
David A. Huffman: A method for the construction of minimum-
redundancy codes; Proceedings of the Institute of Radio Engineers,
I.R.E. Sept 1952, S. 1098-1102 http://compression.ru/download/articles/huff/huffman 1952 minimum-redund
Solutions to Problems 271
Problem 61(a)
To simplify matters, the alphabet consists of say 64 characters blank
(ASCII 32) up to underline (ASCII 95).
text Abrakadabra Abrakadabra
TEXT
pat= chr= init LZWstep
TXT
|dict| = dict[ ]= check reset
codes
old= new= init WZLstep
TEXT
|dict| = dict[ ]= check reset
? Anything special about this implementation ?
Solutions to Problems 272
Problem 62(a) There are three possible cases, namely RR, RR und
RB.
There are two favorable cases, namely RB.
Therefore, P = P (RB) = 1/3.
Solutions to Problems 274
Problem 62(b) Let a/A and z/Z indicate a door with a car resp. a
goat behind. Small letters correspond to initially chosen doors.
Without loss of generality assume that the candidate chooses door
no 1, and the quizmaster reveals the goat behind door no 2. Then
chances to win without revision: P (aZZ) = 1/3
chances to win with revision: P (zZA or zZA) = 2/3
www.comedia.com/hot/monty.html or (Monte-Carlo-) experiment:
doors left middle right 1×
10 ×
state (A=car, Z=goat)
100 ×
x=choice, o=revelation reset
0 without
A total of hits revisions in a total of 0 games, i.e.
0 with
0 without
chances to win ≈ revisions
0 with
Solutions to Problems 275
a = 1300103 c= 0 m = 4294967296 1
h1 = 0 % h2 = 0 % h3 = 0 % h4 = 0 % h5 = 0 %
i.e. the information content of each decimal digit (bit per decimal
digit, bpdd), is maximal for true random numbers (with independent
digits). The entropy E is (for evenly distributed digits) maximal
9
X 1 1 1
Emax = − log2 ( ) = − log2 ( ) ≈ 3.321928 bpdd
i=0
10 10 10
a = 1300103 c= 0 m = 4294967296
0000000000
n= 0 x= 1 E= 0
1× 10 × 100 × test reset
Solutions to Problems 282
a = 1300103 c= 0 m = 4294967296
y
x@ 0 1 2 3 4 5 6 7 8 9 fi,∗
0 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
2 0 0 0 0 0 0 0 0 0 0 0
3 0 0 0 0 0 0 0 0 0 0 0
4 0 0 0 0 0 0 0 0 0 0 0
5 0 0 0 0 0 0 0 0 0 0 0
6 0 0 0 0 0 0 0 0 0 0 0
7 0 0 0 0 0 0 0 0 0 0 0
8 0 0 0 0 0 0 0 0 0 0 0
9 0 0 0 0 0 0 0 0 0 0 0
f∗,j 0 0 0 0 0 0 0 0 0 0 0
α = 0.9 x= 1 χ2 = 0
1× 10 × 100 × test reset
Solutions to Problems 286