Preview

Cryptography and Matrices

Better Essays
Open Document
Open Document
1619 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography and Matrices
Linear Application and Hill Cipher.
Cryptography has played an important role in information and communication security for thousand years. It was first invented due to the need to maintain the secrecy of information transmitted over public lines. The word cryptography came from the Greek words kryptos and graphein, which respectively mean hidden and writing (Damico). Since the ancient days, many forms of cryptography have been created. And in 1929, Lester S. Hill, an American mathematician and educator, introduced a method of cryptography, named Hill cipher, which was based on linear algebra applications. (Anton Rorres 719) Like other forms’, Hill cipher’s basic idea is that by using matrix multiplication, an original message – plaintext – will be converted into a coded message, called ciphertext. This converting process has three main steps: translating the message into a matrix, then multiplying with a cipher matrix to create the encrypted one, and finally converting it into letters.
The very first step of transforming the given message into numbers is to assign every alphabet letter a numerical value. There are many ways to do that, and one of those is that each letter except Z is assigned the numerical value that specifies its position in the alphabet. For example, the letter A is assigned the value of 1, B is 2 and so on. The letter Z, in order to use modular arithmetic later, will be assigned the value of 0. Therefore, if the plaintext is DEPAUW UNIVERSITY, then the corresponding series of numbers is 4, 5, 16, 1, 21, 23, 21, 14, 9, 22, 5, 18, 19, 9, 20 and 25 (the space is omitted).
In order to create a plaintext matrix equivalent to the message, the message is divided into groups of two, three, or more (for a Hill n-cipher, the letters will be separated into groups of n elements). Because the number of letters in a group decides the size of the cipher matrix used in the next step, to make the encoding process less complicated, Hill 2- and 3- cipher

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Lab 1

    • 319 Words
    • 4 Pages

    3. First 4 digits of a Base 5 numbering system would be (left to right) 625 125 25 5…

    • 319 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt1420 Unit 7 Study Guide

    • 582 Words
    • 3 Pages

    22.Write a program to read a sequence of characters and display them in reverse order on the next line. Page: 144…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using a system of 1's and 0's ______________ is the most common way of encoding data.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    ect114

    • 1514 Words
    • 7 Pages

    Encoding is used to generate a coded output (such as BCD or binary) from a singular active numeric input line.…

    • 1514 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    Bryant, L., & Ward, J. (n.d.). Caesar Ciphers: An Introduction to Cryptography. Retrieved February 21, 2015, from http://www.purdue.edu/discoverypark/gk12/downloads/Cryptography.pdf.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Programming Homework

    • 366 Words
    • 2 Pages

    The formula that will be used in this program is num_1 * num_2 adding 1 each repetition using num_2 = num_2 +1…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Matrix Paper

    • 565 Words
    • 2 Pages

    The Matrix directly relates to Plato's Allegory of the Cave. In both works, discovering the truth about reality is the major concept. In the cave, men are chained up and all they know is shadows of puppets that are displayed before them, illuminated by a fire that blazes in the distance. These shadows that the men see on the wall are all they know; this is reality to them. Much like in The Matrix how the people that are in the "Matrix" are unaware of that they are living in a world that doesn't actually expose the people to reality. What they know of in the matrix is reality to them. The shadows on the wall and the matrix both cover up the true reality that exists outside of the people's comfort zone. Neo and Plato's released prisoner go through similar realizations. Both Neo and the released prisoner are chained down (literally and metaphorically) from understanding the truth behind reality. The released prisoner is tied in a way that he cannot move and his head always faces in the direction of the wall. He finds out the truth behind the shadow's that he has known as reality. He soon figures out the real creatures that merely cast their shadows before him. In comparison, Neo is tied down to a massive wall where machines control the lives of the people in the matrix. Neo also realizes the truth when he takes the red pill, which allows him to escape from the Matrix and into the real world, therefore living the truth of reality, even though it is more difficult than life inside the Matrix. Neither the released prisoner nor Neo realize they are prisoners until they are introduced to the truth of reality. The prison of the Matrix is described by Morphius when he says to Neo, "It is the world that has been pulled over your eyes to blind you from the truth." Both Neo and the prisoner can be seen as heroes because they want to help the people who are still blinded by their false conception of reality. Neo is successful in fulfilling his prophecy of becoming "The…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Theory Matrix

    • 477 Words
    • 2 Pages

    | |Major Concepts |Process of Theory Proposed |Process-Driven Quality |Customer-Driven Quality |Company Example That Has Applied |…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. In general, inverses are very difficult to compute. However, on 2x2 matrices, inverses are easy. 2. For a 2x2 matrix:…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One person's code is another's challenge. Cryptanalysts are people who break codes. They're most important clue is how often certain letters and word's appear. In English, as and is occur most often, and the is the most common word. Code breakers first goal is to identify these frequently occurring letters. Then they’ll start to figure out the words the letters appear in. Once they know what the code uses to mean e and t, theyre able to find the word the. Then they'll know what the code uses for h. Its a hard job, but its rewards are many.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There are many security challenges associated with digital signatures. E-Government security and e-business is implemented legally as well as practically by CryptBot e-sign. The security is planned to secure all email sending, encrypting, digitally signing, decrypting and storing and gathering all types of data in the way to authenticate. This works to maintain privacy and avoid rejection by the signer.…

    • 782 Words
    • 4 Pages
    Good Essays