Systems of Equations as Matrices and Hill Cipher.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
390 Codes, Ciphers, and Cryptography
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Numbers on the Internet
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
ENGG2013 Unit 10 n  n determinant and an application to cryptography Feb, 2011.
Cryptography at The University of South Carolina Douglas B. Meade
Section 2.9 The Hill Cipher; Matrices
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Using Inverse Matrices Solving Systems. You can use the inverse of the coefficient matrix to find the solution. 3x + 2y = 7 4x - 5y = 11 Solve the system.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Midterm Review Cryptography & Network Security
Holt Algebra Matrix Inverses and Solving Systems A matrix can have an inverse only if it is a square matrix. But not all square matrices have inverses.
What you will learn 1. What an identity matrix is
Chapter The Integers and Division Division
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Web Tools for Classical Cryptology Tristan Beeble.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Governor’s School for the Sciences Mathematics Day 5.
Mathematical Concepts in Cryptography 355 Brian Tafel, Mark Shippy Raymond Fuller, and Mireya.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
MAT 1000 Mathematics in Today's World Winter 2015.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Cryptography and Coding Theory
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
M3: Encryption r By Andrew Stringer.
Cryptography and Advanced Ciphers
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Section 6.4 Multiplicative Inverses of Matices and Matrix Equations
Applications of Inverse Matrices
Section 9.4 Multiplicative Inverses of Matices and Matrix Equations
Introduction to Elliptic Curve Cryptography
Public – Private Key Cryptography
SLOT Week 9 – Day 1.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Presentation transcript:

Systems of Equations as Matrices and Hill Cipher. Annela Kelly Bridgewater State University

Matrix Algebra Algebra ax=b 5x=3 x= 3 5 = 5 −1 3 Ax=b 5 0 2 1 𝑥 1 𝑥 2 = 3 4 𝑥 1 𝑥 2 = 5 0 2 1 −1 3 4 What is 5 0 2 1 −1 ? Matrix multiplication review applet at: https://www.khanacademy.org/math/algebra2/alg2-matrices/matrix-multiplication-alg2/e/multiplying_a_matrix_by_a_matrix or http://www.mathsisfun.com/algebra/matrix-multiplying.html

Matrix inverse formula 𝐴 𝐴 −1 = 1 0 0 1 Matrix inverse for 2× 2matrix: EXAMPLE: To get more details and in-depth discussion about inverses: http://www.mathsisfun.com/algebra/matrix-inverse.html

Cryptology Caesar Cipher (100 BC)

Hill cipher As time progressed, the study of cryptography began to involve higher level mathematics. With this more advanced math came more advanced ciphers based on the idea of encryption and decryption keys. Encryption keys are a special value or set of values used in an encryption algorithm to convert a plaintext into a cipher text. A decryption key is the opposite. One encryption scheme that utilizes more advanced mathematics, as well as encryption and decryption keys is a cipher from 1929 called the Hill cipher. The Hill cipher is based on matrix multiplication and is a lot more secure than the Caesar cipher that was previously discussed.

Numbers into letters Example: BED 1 4 3

Modular Calculations What if a number is bigger than 26 or smaller than 0? Use “clock arithmetic”: 12 ≡ 12 27 ≡ 1 -1 ≡ 25 53 ≡ 1 Worksheet on clock arithmetic!

(Matrix) inverses formula modulo 26 Algebra 5 ∙6=30 5 ∙21=105 5∙ 1 5 =1 i.e. 5 −1 = 1 5 Modulo 26 Algebra 5 ∙6 ≡ 4 5 ∙21 ≡ 1 5 −1 ≡ 21 Worksheet on inverses mod 26!

Encoding in Hill Cipher Convert letters into numbers Write message into blocks (matrices) of two Multiply decoding matrix A with the vectors Convert numbers into letters

Decoding in Hill Cipher Convert numbers into letters: Multiply decoding matrix 𝐴 −1 with the vectors: Convert numbers into letters Worksheet on encoding and decoding!

Exchanging secrets MESSAGE: CALCULUS CODE: EGUPDAWC -1 2 −1 3 4 CODE: EGUPDAWC -1 DECODED MESSAGE: CALCULUS More info on Hill Ciphers at: http://www.unc.edu/~marzuola/Math547_S13/Math547_S13_Projects/R_Doyle_Section001_Cryptography.pdf