14 views

Uploaded by kaus_hik

- network security and cryptography
- IRJET-An Enhanced Triple Data Encryption Standard (Tdes) Algorithm to Secure Health Level Seven (Hl7) Data Transfer
- A SURVEY ON IMAGE ENCRYPTION SCHEMES
- Introduction to Information Systems
- 804
- A Novel Approach for Cryptography using Modified Substitution Cipher and Triangulation
- rajesh Term_Paper Format_CST (3).odt
- Secret Message Secure Communication in A Group Using Pkcs Based on Sponge Function
- GPG - encryption & signing
- Revision2OfTR05-146
- cryptography in networking
- Analysis of Effective Encryption Techniques for Attribute-Based System in Storage Cloud
- IRJET-Data Access Privilege With Attribute-Based Encryption and Users Revocation
- Attribute-Based Data Access Policy & Key Escrowing Problem_ a Review Paper
- DataMiningTechniquefor SecureEpaymentTxn
- Key Generation and Certification using Multilayer Perceptron in Wireless Communication (KGCMLP)
- ITWELEC6-Chapter2-Cryptography_Fundamentals.ppt
- p114 Cryptography
- FEDSACE: A Framework for Enhanced user Data Security algorithms in Cloud Computing Environment
- IEEE 2014 JAVA DATA MINING PROJECT Trusted DB a Trusted Hardware Based Database With Privacy and Data Confidentiality.doc

You are on page 1of 36

Natural Science

medicine Social Science Applied mathematics, the branch of mathematics concerned

with application of mathematical knowledge to other fields, inspires and makes use of new mathematical discoveries and sometimes leads to the development of entirely new mathematical disciplines, such as statistics and game theory.

Introduction:

Matrix

Definition: A matrix is an ordered set of numbers listed in

sense in English. It can also mean more generally any place in which something is formed or produced.

The origin of mathematical matrices lie with the study

of systems of simultaneous linear equations. An important Chinese text from between 300 BC and AD 200, Nine Chapters of the Mathematical Art (Chiu Chang Suan Shu), gives the first known example of the use of matrix methods to solve simultaneous equations.

The term "matrix" for such arrangements was introduced in 1850 by James Joseph Sylvester

Applications

Of

Matrices

Transformations:

Transformations are an important part of every 3D application. This knol discusses the different types of transformations and what you can do with them. The most important transformations you will encounter are : World transformation : change the scale, translation and rotation of an object. The transformation can be the result of a concatenation (multiplication) of several transformation matrices. A world transformation is usually a unique transformation for each 3D object in the scene.

add a perspective projection to the scene or an orthogonal projection. This transformation uses homogenous coordinates. A number of specific applications of transformations :

Aligning an object with the camera (object is always in the same relative position from the camera) A hierarchy of transformations can be used to transform objects with parent child relationships (for example the rotation of a steering wheel in a moving car)

Applications..

2.Matrices can also be used to display networks allowing

mathematical calculations to be worked out more easily with relation to problems such as traffic flow and plumbing.

3.Real-life Applications:

DIGITAL IMAGES:

A digital camera produces a matrix of numbers when it

takes a picture. The lens of the camera focuses an image on a flat rectangular surface covered with tiny light-sensitive electronic devices. The devices detect the color and brightness of the image in focus, and this information is saved as a matrix of numbers in the camera's memory. When a picture is downloaded from a camera to a computer and altered using image-editing software, it is subjected to mathematical manipulations described by matrix algebra.

Real-life Applications:

FLYING THE SPACE SHUTTLE:

In the early days of flight, pilots pushed and pulled on a

joystick connected to wires. The wires ran over pulleys to the wings and rudder, which steered the plane. It would not be possible to fly as complex a craft as the Space Shuttle, which is steered not only by movable pieces of wing, but by 44 thruster jets, by directly mechanical means like these. Steering must be done by computer, in response to measurements of astronaut hand pressure on controls. In this method the flight computer combines measurements from sensors that detect how the ship is moving with measurements from the controls.

These measurements are fed through the flight computers of the Shuttle as vectors, that is, as n 1 matrices, where the measurements from ship and pilot are the numbers in the vectors. The ship's computer performs calculations on these vectors using matrix algebra in order to decide how to move the control surfaces (moveable parts of the wing and tail) and how to fire the 44 steering jets.

Real-life Applications:

DESIGNING CARS: Before the 1970s, car makers designed new cars by

making first drawings, then physical models, then the actual cars. Since the 1970s, they have also used a tool called computer-aided design (CAD). CAD is now taught in many high schools using software far more sophisticated than was available to the big auto makers in the beginning, but the principles are the same. When a new image has been agreed on, the next step is the creation of a "wireframe" model.

The wireframe model is a mass of lines, defined by numbers stored in matrices. The wireframe car model is stored as a collection of many matrices, each describing one part. More importantly, by using matrix-based mathematical techniques called finite element methods, the car company can use the wireframe model to predict how the design will behave in crashes and how smoothly air will flow over it when it is in motion. These features can be experimentally improved by changing numbers in matrices rather than by building expensive test models.

Cry Pto Graphy

Cryptography.

Definition(Technical) Cryptographycalled "crypto" by its practitionersis the

study of codes and ciphers and their use to protect information. Cryptography is a scientific mix of mathematical theory and computational application which allows the confidential transfer of information.

Definition(Simple) Cryptography, to most people, is concerned with keeping

communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history

Uses.

Cryptography has existed, in one form or another, since the ancient Greeks began toying with methods for encoding with mathematics. In the modern period, cryptography was utilized mainly in wartime to protect sensitive military information, and in the high-stakes and secretive world of diplomacy and spying. II. For years, computer-based cryptography was almost exclusively used by the United States National Security Agency (NSA) for coding and decoding sensitive information and messages during the Cold War. For many years after private-sector computer scientists began working on cryptography, the government fought such efforts out of concern for national security.

I.

Encryption..(Encoding)

.

Encryption is the transformation of data into some unreadable form. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data.

Encryption Process

I. Convert the text of the message into a stream of numerical values. II. Place the data into a matrix. III. Multiply the data by the encoding matrix. IV. Convert the matrix into a stream of numerical values that contains the encrypted message.

Decryption..(Decoding)

Decryption is the reverse of encryption; it is the transformation of encrypted data back into some intelligible form.

Decryption Process

Place the encrypted stream of numbers that represents an encrypted message into a matrix. II. Multiply by the decoding matrix. The decoding matrix is the inverse of the encoding matrix. III. Convert the matrix into a stream of numbers. IV. Convert the numbers into the text of the original message.

I.

Encryption and decryption require the use of some secret information, usually referred to as a key. Depending on the encryption mechanism used, the same key might be used for both encryption and decryption, while for other mechanisms, the keys used for encryption and decryption might be different.

Today governments use sophisticated methods of coding and decoding messages. One type of code, which is extremely difficult to break, makes use of a large matrix to encode a message. The receiver of the message decodes it using the inverse of the matrix. This first matrix is called the encoding matrix and its inverse is called the decoding matrix.

The two basic infrastructures used in cryptographic

systems are public-key and private-key. A private key maintained by a single entity and a public key available to any user over a network. A central authority, such as an online bank, broadcasts its public key, enabling any client to send encrypted messages to that destination. Only that original authority, however, can decrypt the communications using its private key

Plain Text: Original data or text is known as Plain text. Cipher Text: The encrypted message(unreadable message). Encryption: Changing the Plain text to unreadable. Decryption: Changing the cipher text to plain text.

Summary.

A message is converted into numeric form according to

Q=17,R=18,S=19,T=20,U=21,

V=22,W=23,X=24,Y=25 & Z=26.

i.

The message "Red Rum" would become 18, 5, 4, 0, 18, 21,13. ii. This data is placed into matrix form. The size of the matrix depends on the size of the encryption key. iii. Let's say that our encryption matrix (encoding matrix) is a 2x2 matrix. Since there are seven pieces of data, I would place that into a 4x2 matrix and fill the last spot with a space to make the matrix complete. iv. Let's call the original, unencrypted data matrix A.

18 4 18 13

5 0 21 0

A=

There is an invertible matrix which is called the encryption matrix or the encoding matrix. We'll call it matrix B. Since this matrix needs to be invertible, it must be square. This could really be anything, it's up to the person encrypting the matrix. I'll use this matrix.

4 -2

B=

-1 3

The unencrypted data is then multiplied by our encoding matrix. The result of this multiplication is the matrix containing the encrypted data. We'll call it matrix X. 67 -21 16 -8 51 27 52 -26

X=AB=

The receiver must calculate the inverse of the encryption matrix. This would be the decryption matrix or the decoding matrix.

0.3 0.2 0.4

B-1 =

0.1

The receiver then multiplies the encrypted data by the inverse of the encryption matrix. The result is the original unencrypted matrix.

A = X B-1 =

18

18 4

5 0 21 0

13

The receiver then takes the matrix and breaks it apart into values 18, 5, 4, 0, 18, 21, 13, 0 and converts each of those into a character according to the numbering scheme. 18=R, 5=E, 4=D, 0=space, 18=R, 21=U, 13=M, 0=space. Trailing spaces will be discarded and the message is received as intended: "RED RUM"

- network security and cryptographyUploaded bySai Srinivas
- IRJET-An Enhanced Triple Data Encryption Standard (Tdes) Algorithm to Secure Health Level Seven (Hl7) Data TransferUploaded byIRJET Journal
- A SURVEY ON IMAGE ENCRYPTION SCHEMESUploaded byIJIERT-International Journal of Innovations in Engineering Research and Technology
- Introduction to Information SystemsUploaded byDr Riktesh Srivastava
- 804Uploaded byibrahim1
- A Novel Approach for Cryptography using Modified Substitution Cipher and TriangulationUploaded byIRJCS-INTERNATIONAL RESEARCH JOURNAL OF COMPUTER SCIENCE
- rajesh Term_Paper Format_CST (3).odtUploaded byrajesh kumar
- Secret Message Secure Communication in A Group Using Pkcs Based on Sponge FunctionUploaded byAJER JOURNAL
- GPG - encryption & signingUploaded byopenid_1FLLsijK
- Revision2OfTR05-146Uploaded bySonam Mittal
- cryptography in networkingUploaded byed3uzacoi1zy
- Analysis of Effective Encryption Techniques for Attribute-Based System in Storage CloudUploaded byIRJET Journal
- IRJET-Data Access Privilege With Attribute-Based Encryption and Users RevocationUploaded byIRJET Journal
- Attribute-Based Data Access Policy & Key Escrowing Problem_ a Review PaperUploaded byIJAERS JOURNAL
- DataMiningTechniquefor SecureEpaymentTxnUploaded byjyothiswaroopga
- Key Generation and Certification using Multilayer Perceptron in Wireless Communication (KGCMLP)Uploaded byijsptm
- ITWELEC6-Chapter2-Cryptography_Fundamentals.pptUploaded byAljohn Mark Reyes
- p114 CryptographyUploaded byjnanesh582
- FEDSACE: A Framework for Enhanced user Data Security algorithms in Cloud Computing EnvironmentUploaded byRahul Sharma
- IEEE 2014 JAVA DATA MINING PROJECT Trusted DB a Trusted Hardware Based Database With Privacy and Data Confidentiality.docUploaded by2014DATAMINING
- SteganographyUploaded bySushant
- OAG_ExplorerUserguideUploaded byMatias
- 9781439809600-aUploaded byroutingprotocol1104
- Improving Security of Mosaic Images by Cryptographic Algorithm and Compression TechniqueUploaded byIRJET Journal
- EZ Cash IPG Integration User Guide-1.1.4Uploaded byManoj Darshana Masakorala
- Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decomposition MethodUploaded byEditor IJTSRD
- gowda2016Uploaded byaj
- IRJET-A Survey on Secure Data Sharing with Forward Security in Cloud ComputingUploaded byIRJET Journal
- RSA Algorithm for Encryption and Digital SignaturesUploaded byadeeliqbal43891
- DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyUploaded byIJIRAE- International Journal of Innovative Research in Advanced Engineering

- cisco acs1.pdfUploaded byshan1512
- Cryptlib ManualUploaded bysg1121993
- Ipsec Tunnel CreationUploaded bymuttbarker
- Asymmetric Key, Data Encryption Standard (DES), Nth- Degree Truncated Polynomial Ring Unit(NTRU), Rivest- Shamir- Adleman(RSA), Symmetric KeyUploaded byKruti Shah
- Password AwarenessUploaded byAbhiKeenoo
- CS283 W1L1 SyllabusUploaded byRahul Lokare
- SY0-201Uploaded bysf492k
- JavaSymmetric.pptUploaded byasifmechengr
- Digital Signatures and the Hidden Costs of PKIUploaded byPaul Glen
- Designing a Logical Security Framework for E-Commerce System Based on SOA.pdfUploaded byKhanbalam
- 62241Uploaded byscribd51015
- Encryption SchemesUploaded bybmboriya
- Symmetric Key Encryption_Lecture-3Uploaded byalextrek
- RSA Encryption Program(Eclipse) - Mobile Security LabwareUploaded byterbaru
- Somewhat Homomorphic Encryption Technique With Its Key Management ProtocolUploaded byEditor IJRITCC
- Safend Encryptor Key ManagementUploaded byanon_868834193
- Banking and Payment System StabilityUploaded byFlaviub23
- A Mathematical Approach to FullyUploaded byAhmed Sakr
- Information Security Manual 2014 ControlsUploaded bymikeymagic
- Online E-Voting Prototype With PTC Web Services v1Uploaded byAshish Jaiswal
- Revocation based De-duplication Systems for Improving Reliability in Cloud StorageUploaded byAnonymous kw8Yrp0R5r
- Security Services AdminUploaded byM Arshad Shaikh
- ds-writing-secure-code-java.pdfUploaded byabdel_lak
- Blockchain Technology and Applications from a Financial PerspectiveUploaded byCoinDesk
- DS3+ +Authentication+Regulations+Guidelines+ComplianceUploaded byPrakash India
- Lab Report IpsecUploaded byv4meet
- SSL and TLS: A Beginners GuideUploaded byovidiutache
- CAS Manual (1)Uploaded bymehdi.chlif4374
- DesUploaded bynoorhilla
- Secure Storage in Cloud ComputingUploaded byKhanh Tran