0% found this document useful (0 votes)
26 views

Example of Cryptography

This document provides an example of cryptography using a simple letter-number substitution cipher. [1] It assigns each letter of the alphabet a number from 1-26. [2] It then shows encrypting the message "NIRMA UNI" by replacing each letter with its corresponding number. [3] The decryption process involves multiplying the encrypted message by the inverse of the encryption key matrix to recover the original plaintext.

Uploaded by

NAKRANI HIMANSHU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Example of Cryptography

This document provides an example of cryptography using a simple letter-number substitution cipher. [1] It assigns each letter of the alphabet a number from 1-26. [2] It then shows encrypting the message "NIRMA UNI" by replacing each letter with its corresponding number. [3] The decryption process involves multiplying the encrypted message by the inverse of the encryption key matrix to recover the original plaintext.

Uploaded by

NAKRANI HIMANSHU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

EXAMPLE OF CRYPTOGRAPHY :

 Representation of alphabets into numbers in cryptography


(for this example only):

A 1 D 4 G 7 J 10 M 13 P 16 S 19 V 22 Y 25
B 2 E 5 H 8 K 11 N 14 Q 17 T 20 W 23 Z 26
C 3 F 6 I 9 L 12 O 15 R 18 U 21 X 24 SPACE27

 Original message :

NIRMA UNI

 Encryption process:

N=14

I=9

R=18

M=13

A=1

SPACE=27

U=21

N=14

I=9
 Matrix of message (M) :

 Key matrix (C) [sent by sender with message,can be different]:

 Matrix multiplication:

Now we will multiply both matrices M and C ;

[MC] ~

This matrix will sent to recipient. Recipient will decode this matrix by multiplying it with
inverse of key matrix ;

 Decryption process:
 Key matrix (C) :

 Inverse of key matrix (C-1) :

 Decoding of message using inverse key:

[MC*C-1] ~

14 = N

9 =I
18= R

13= M

1 =A

27= SPACE

21= U

14 = N

9 = I

NIRMA UNI
This message will shown to recipient after decryption.

You might also like