Cryptography in An Algebraic Alphabet
Cryptography in An Algebraic Alphabet
(mod 26)
(mod 26)
.
These correspond to the ciphertext pairs VS, WO,
YC, UP, CH, RK, GJ, LA, PC, FC, and WW, respectively.
So, the entire ciphertext message is
V S W O Y C U P C H R K G J L A P C F C W W.
. 1.5. Theorem
For any modulus m, it can be proved that every
integer ‘a’ is equivalent, module m, to exactly one of the A square matrix A with entries in is
invertible modulo m if and only if the residue of det A
integers . We call this integer the residue ‘a’
modulo m has a reciprocal modulo m.
modulo m.
1.6. Corollary
We write to denote the set A square matrix A with entries in is
of residue module m. invertible modulo m if and only if m and the residue of det
A modulo m have no common prime factors.
1.3. Theorem
For any integer ‘a’ and modulus m, let 1.7. Corollary
A square matrix A with entries in is
. invertible modulo 26 if and only if the residue of det A
Then the residue r of a modulo m is given by modulo 26 is not divisible by 2 or 13.
given by where
If ‘a’ is a number in , then a number in 1.8. Example (Inverse of a matrix mod 26)
Then we get 3 5 18 6 7 12 5 23 15 5 5 18 19 4 19 5 23 15
5 17 18 4 9 25 3 24 18 15 5 23 7 22 21.
. To obtain the plaintext pair, we multiply each ciphertext
Then vector by the inverse of the matrix A.
So and .
Then we get
Then
(mod 26)
(mod 26)
From Table 1, the alphabet equivalents of these vectors
yields the message
SAKNOXAOJX
WE LOVE MATH.
CER FGL EWO EER SDS EWO EQR DIY CXR OEW
GVU,
which yields the message so the corresponding plaintext and ciphertext vectors are
D E A R
4 5 1 18 add times the
second row to the first
and the numerical equivalent of the corresponding
ciphertext is
replace the entries in the
I O S B first row by their residues
9 15 19 2 modulo 26.
6
ATOM
JYQO.
. We will do as the above procedure from example
To decipher the message, we first group the ciphertext into (3.1), but we have to take the letters from the end to
pairs and find the numerical equivalent of each letter: forward.
S P X H O P D E .
19 16 24 8 15 16 4 5 After the computations had been carried out, we get the
Next, we multiply successive ciphertext vectors on the left
by and find the alphabet equivalents of the resulting matrix and so the deciphering matrix
plaintext pairs:
is .
To decipher the message, we multiply the successive
ciphertext vectors from the end to forward.
Then we get as follows;
(mod 26)
(mod 26)
.
Finally, we construct the message from the plaintext pairs:
DE AR IK ES EN DT AN KS
REFERENCES
[1] Lester S. Hill, “Cryptography in an Algebraic
Alphabet”, The American Mathematical Monthly,
Vol. 36, No. 6. (Jun. - Jul., 1929), pp. 306-312.
[2] Lester S. Hill, “Cryptography in an Algebraic
Alphabet”, The American Mathematical Monthly,
Vol. 38, No. 3 (Mar., 1931), pp. 135-154.
[3] Howard Anton and Chris Rorres, “Elementary
Linear Algebra: Applications Version, 10th,
2010.