Professional Documents
Culture Documents
La2 Presentation PDF
La2 Presentation PDF
Linear Algebra
Topic:CRYPTOGRAPHY
Table of Contents:
1. Introduction
2. Summary of applications in LA
3. Encrypting a message
4. Encryption process
5. Decryption process
6. Modular arithmetic
7. Examples
8. References
Introduction:
CRYPTOGRAPHY
Cryptography or cryptology, is the practice and study of hiding information. It is sometimes called
code, but this is not really a correct name. It is the science used to try to keep information secret and safe.
Modern cryptography is a mix of mathematics, computer science, and electrical engineering.
Cryptography is used in ATM (bank) cards, computer passwords, and shopping on the internet.
The study of encoding and decoding secret messages is called cryptography. Although secret codes date to
the earliest days of written communication, there has been a recent surge of interest in the subject because
of the need to maintain the privacy of information transmitted over public lines of communication. In the
language of cryptography, codes are called ciphers, uncoded messages are called plaintext, and coded
messages are called ciphertext. The process of converting from plaintext to ciphertext is called
enciphering, and the reverse process of converting from ciphertext to plaintext is called
deciphering.
Summary of Application in Linear Algebra
A matrix can be used to In order to encrypt plaintext, These numbers can range in
encrypt a message. each character in the plaintext value, but an example is using
must be denoted with a 1-26 to represent A to Z and
The matrix must be invertible numerical value and 27 to represent a space.
for use in decrypting. placed into a matrix.
Encrypting a message :
1. Each character of the plaintext is given a numerical values as stated before.
2. These values are then separated into vectors, S.T. the number of rows of each vector is equivalent to
thenumber of rows the cipher matrix.
3. Values are placed into each vector one at a time, going down a row for each values. A vector is filled
bythe plaintext then the remaining entries will hold the values for space.
4. The vectors are then augmented to form a matrix that contains the plaintext.
5. The plaintext matrix is then multiplied with the cipher matrix to create the ciphertext matrix.
The encryption process:
We can summarize the encryption in the following steps.
I. Choose a pxp matrix A which is invertible, where p may have be depends on the length of the
message that needs to be encrypted.
II. Change each plaintext to its numerical value units.
III. Form the px1 column vector P, having these numerical values as its entries.
IV. Get each vector C by multiplying A with P1 and convert each entry of the
vector to its letter in the alphabet. The encryption algorithm of this method is:C= AP mod N
The decryption process: