Cryptography
Cryptography
PRESENTATION
INTRODUCTION
information so that only the person a message was
intended for can read it. The art of cryptography has been
used to code messages for thousands of years and continues
to be used in bank cards, computer passwords, and
ecommerce.
GOOD ENGINEER
Here are the different types of cryptography: Hash Functions: Hash functions don’t rely on
keys. Instead, they scramble data of varying
size into values of uniform length. With hash
Secret Key Cryptography: A secret key is used to both
functions, both a one-word message and a
encrypt and decrypt the data. The sender includes the
1000-page novel create a fixed-sized output of
secret key in the coded message sent to the intended
encoded text (called a hash value), making it
recipient. If the message is intercepted, the included key
nearly impossible to determine the original
can decode its contents. content. Commonly using the MD5 hashing
algorithm, hashing is often used for
Public Key Cryptography: The sender uses a public key to authentication purposes.
encrypt the message, and the receiver uses a private key to
decrypt it. If the message is intercepted, the contents can’t
be deciphered without the private key.
.
Application of matrices in cryptography
Encryption dates back approximately 4000 years. Historical accounts indicate that the Chinese,
Egyptians, Indian, and Greek encrypted messages in some way for various purposes. One famous
encryption scheme is called the Caesar cipher, also called a substitution cipher, used by Julius
Caesar, involved shifting letters in the alphabet, such as replacing A by C, B by D, C by E, etc, to
encode a message. Substitution ciphers are too simple in design to be considered secure today.
In the middle ages, European nations began to use encryption. A variety of encryption methods
DATA
were used in the US from the Revolutionary War, through the Civil War, and on into to modern
times.
With the advent of the computer age and internet communication, the use of encryption has
become widespread in communication and in keeping private data secure; it is no longer limited
to military uses. Modern encryption methods are more complicated, often combining several
steps or methods to encrypt data to keep it more secure and harder to break. Some modern
methods make use of matrices as part of the encryption and decryption process; other fields of
mathematics such as number theory play a large role in modern cryptography.
.To use matrices in encoding and decoding secret messages, our procedure is as follows.
We first convert the secret message into a string of numbers by arbitrarily assigning a number
to each letter of the message. Next we convert this string of numbers into a new set of numbers
by multiplying the string by a square matrix of our choice that has an inverse. This new set of
numbers represents the coded message.
To decode the message, we take the string of coded numbers and multiply it by the inverse of
the matrix to get the original string of numbers. Finally, by associating the numbers with their
corresponding letters, we obtain the original message.
In this section, we will use the correspondence shown below where letters A to Z correspond to
the numbers 1 to 26, a space is represented by the number 27, and punctuation is ignored.
EXAMPLES
To encrypt a message using matrix cryptography with the value "h=8" and a message, you would typically use
a matrix encryption key. Let's consider a basic example:
Let's calculate its inverse, and then we can decrypt the message.
Calculate the Inverse of Key Matrix (K)^(-1):
The inverse of a 2x2 matrix can be calculated as follows:
|a b| | 3 -1 |
| c d | -> | -1 2 |
Now, to encrypt "a" using matrix cryptography, we'll multiply the Key Matrix (K) by the numeric
representation of "a" (1):
| 2 1 | | 1 | = | (2*1 + 1*1) | = | 3 |
Juliana Silva
|1 3| | | | (1*1 + 3*1) | |4|
Client
So, the encrypted value of "a" is represented by the matrix [3, 4].
To decrypt, you would need the inverse of the Key Matrix (K)^(-1) and multiply it by the encrypted
matrix to obtain the original value
Encrypting above message
The super hi-tech LOCK used is
LOCK is a rectangular array of numbers in rows and columns, and are asked to write
down the special name of such an array of numbers, as well as its order
First encode message in group:
result:
Now what has happened is that the letters P, L and E, which are originally given the codes 16, 12 and 5
respectively, have now ended up being correspondingly represented by the codes 21, –4 and 22. So numbers
21 and 22 can be converted directly into the codes U and V respectively based on the coding system given in
Table 1. That is to say, the letters U and V become the corresponding encrypted codes for P and E. However,
there is a problem here in such a technique. The number –4 cannot be converted because none of the codes
in Table 1 corresponds to it So we resolves this problem by reducing –4 modulo 30 to obtain 26. That is,
In other words,
which is represented by