0% found this document useful (0 votes)
113 views3 pages

Neelima

The document summarizes the encryption and decryption process in 4 steps: 1. The text message is converted to numerical values and placed in a matrix. 2. This matrix is multiplied by an encoding matrix to produce an encrypted matrix. 3. The encrypted matrix is converted to a stream of numbers for transmission. 4. To decrypt, the receiver places the numbers in a matrix and multiplies by the inverse encoding matrix to recover the original message matrix and then text.

Uploaded by

Div Dudeja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views3 pages

Neelima

The document summarizes the encryption and decryption process in 4 steps: 1. The text message is converted to numerical values and placed in a matrix. 2. This matrix is multiplied by an encoding matrix to produce an encrypted matrix. 3. The encrypted matrix is converted to a stream of numbers for transmission. 4. To decrypt, the receiver places the numbers in a matrix and multiplies by the inverse encoding matrix to recover the original message matrix and then text.

Uploaded by

Div Dudeja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Encryption Process

1. 2. 3. 4. Convert the text of the message into a stream of numerical values. Place the data into a matrix. Multiply the data by the encoding matrix. Convert the matrix into a stream of numerical values that contains the encrypted message.

Example Consider the message "Red Rum" A message is converted into numeric form according to some scheme. The easiest scheme is to let space=0, A=1, B=2, ..., Y=25, and Z=26. For example, the message "Red Rum" would become 18, 5, 4, 0, 18, 21, 13. This data was placed into matrix form. The size of the matrix depends on the size of the encryption key. Let's say that our encryption matrix (encoding matrix) is a 2x2 matrix. Since I have seven pieces of data, I would place that into a 4x2 matrix and fill the last spot with a space to make the matrix complete. Let's call the original, unencrypted data matrix A. 1 8 4 A= 1 8 1 3 5 0 2 1 0

There is an invertible matrix which is called the encryption matrix or the encoding matrix. We'll call it matrix B. Since this matrix needs to be invertible, it must be square. This could really be anything, it's up to the person encrypting the matrix. I'll use this matrix. 4 B= 2

3 1

The unencrypted data is then multiplied by our encoding matrix. The result of this multiplication is the matrix containing the encrypted data. We'll call it matrix X. 6 7 1 6 X=AB= 5 1 5 21 -8 27 -

2 26 The message that you would pass on to the other person is the the stream of numbers 67, -21, 16, -8, 51, 27, 52, -26.

Decryption Process
1. Place the encrypted stream of numbers that represents an encrypted message into a matrix. 2. Multiply by the decoding matrix. The decoding matrix is the inverse of the encoding matrix. 3. Convert the matrix into a stream of numbers. 4. Conver the numbers into the text of the original message. Example The message you need to decipher is in the encrypted data stream 67, -21, 16, -8, 51, 27, 52, -26. The encryption matrix is not transmitted. It is known by the receiving party so that they can decrypt the message. Other times, the inverse is known by the receiving party. The encryption matrix can not be sent with the data, otherwise anyone could grab the data and decode the information. Also, by not having the decoding matrix, someone intercepting the message doesn't know what size of matrix to use. The receiving end gets the encrypted message and places it into matrix form. 6 7 1 6 X= 5 1 5 2 21 -8 27 26

The receiver must calculate the inverse of the encryption matrix. This would be the decryption matrix or the decoding matrix. 0. 3 B-1 = 0. 1 0. 2 0. 4

The receiver then multiplies the encrypted data by the inverse of the encryption matrix. The result is the original unencrypted matrix. 1 5 8

4 A = X B-1 = 1 8 1 3

0 2 1 0

The receiver then takes the matrix and breaks it apart into values 18, 5, 4, 0, 18, 21, 13, 0 and converts each of those into a character according to the numbering scheme. 18=R, 5=E, 4=D, 0=space, 18=R, 21=U, 13=M, 0=space. Trailing spaces will be discarded and the message is received as intended: "RED RUM"

You might also like