36474R 0/15 fail 1:() 2:() 3:() 4:() 5:() 43473B 0/15 fail 1:() 2:() 3:() 4:() 5:() 44656H 9/15 fail 1:(3) 2:(3) "decryption with public key" = signature verification 3:(0) 4:(3) 5:(0) 45181W 0/15 fail 1:() 2:() 3:() 4:() 5:() 45283H 0/15 fail 1:() 2:() 3:() 4:() 5:() 46576J 0/15 fail 1:() 2:() 3:() 4:() 5:() 46602S 13/15 pass 1:(3) although in b -- this is not the group generated by P, which is a subgroup of the whole curve 2:(3) 3:(3) 4:(3) 5:(1) 46770N 11/15 pass 1:(3) 2:(2) alice encrypts -- should sign 3:(2) 4:(3) 5:(1) 47991U 9/15 fail 1:(3) 2:(1) strange -- RSA not used 3:(2) 4:(3) 5:(0) 47993W 14/15 pass 1:(3) 2:(3) 3:(3) 4:(3) 5:(2) 48044P 0/15 fail 1:() 2:() 3:() 4:() 5:() 48052B 13/15 pass 1:(3) 2:(3) 3:(2) 4:(3) 5:(2) 48332T 5/15 fail 1:() 2:(1) confusion of concepts 3:(2) 4:() 5:(2) 48850B 12/15 pass 1:(3) yes, there is a supergroup of order 1026 generated by [596, 351] 2:(3) 3:(2) 4:(3) 5:(1) 49466L 14/15 pass 1:(3) 2:(3) why is bob's key used 3:(3) 4:(3) 5:(2) 49469P 13/15 pass 1:(3) 2:(3) 3:(3) 4:(3) 5:(1) 49500F 0/15 fail 1:() 2:() 3:() 4:() 5:() 49506N 0/15 fail 1:() 2:() 3:() 4:() 5:() 49540J 14/15 pass 1:(3) order is 513 2:(2) "A sends a message encrypted with her public key" ?! 3:(3) 4:(3) what's this stuff about GF(256) ? 5:(3) 49612D 13/15 pass 1:(3) 2:(2) sequence number assumes that bob and alice "are in sync"; attacker may disrupt this sequence by removing messages. challenge-response would be secure against such attacks. 3:(3) 4:(3) 5:(2) 49619M 10/15 pass 1:(3) 2:(2) no challenge-response; suspectible to replay attack 3:(2) 4:(2) f(10000) and points wrong 5:(1) 49825J 10/15 pass 1:(2) for effort 2:(3) 3:(2) 4:(3) 5:(0) 49932A 0/15 fail 1:() 2:() 3:() 4:() 5:() 50007W 11/15 pass 1:(3) 2:(3) 3:(3) 4:(2) errors 5:(0) 51023K 14/15 pass 1:(3) order is 513 2:(3) 3:(2) 4:(3) 5:(3) 51050U 0/15 fail 1:() 2:() 3:() 4:() 5:() 51075D 0/15 fail 1:() 2:() 3:() 4:() 5:() 51121N 0/15 fail 1:() 2:() 3:() 4:() 5:() 51135H 15/15 pass 1:(3) order is 513 2:(3) 3:(3) 4:(3) 5:(3) 51213K 10/15 pass 1:(3) 2:(3) "encryption with secret key" = signature 3:() 4:(3) 5:(1) 52572W 10/15 pass 1:(2) order is wrong 2:(2) falls to replay attack 3:(2) 4:(3) 5:(1) 52617H 15/15 pass 1:(3) 2:(3) 3:(3) 4:(3) 5:(3) 52717N 7/15 fail 1:(1) 2:(3) 3:(3) 4:(0) 5:(0) 52820A 6/15 fail 1:(1) 2:(2) seems to fall to a replay attack 3:(3) 4:() 5:() 52834S 0/15 fail 1:() 2:() 3:() 4:() 5:() 54130W 12/15 pass 1:(3) 2:(3) 3:(3) 4:(3) 5:(0) 54134D 0/15 fail 1:() 2:() 3:() 4:() 5:() 54715S 10/15 pass 1:(2) for effort 2:(2) exactly what is bob checking ? 3:(2) 4:(2) for effort (wrong answers) 5:(2) 57398W 0/15 fail 1:() 2:() 3:() 4:() 5:() 57950A 10/15 pass 1:(2) code for R, not GF(997) 2:(2) confusion with private/public key, signatures/encryption 3:(2) 4:(2) 5:(2) 59868W 12/15 pass 1:(3) 2:(3) 3:(2) 4:(3) 5:(1) 60057V 0/15 fail 1:() 2:() 3:() 4:() 5:() ?Issaeva 13/15 pass 1:(3) 2:(1) algebra doesn't seem to hold (hashes are invertible) 3:(3) 4:(3) 5:(3)