Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

USE OF MATRICES IN CRYPTOGRAPHY What is cryptography? Cryptography, the science of encrypting and deciphering messages written in secret codes, has played a vital role

USE OF MATRICES IN CRYPTOGRAPHY
What is cryptography?
Cryptography, the science of encrypting and deciphering messages written in secret codes, has
played a vital role in securing information. With millions of financial transactions conducted over the
internet daily, cryptography has become more important than ever. Companies have begun to make
online transactions more secure by installing encryption software to prevent sensitive information
such as credit card numbers from falling into the wrong hands.
There are several cryptographic techniques and many extensive uses of mathematics to secure
information. One of the techniques uses for encoding and decoding messages is the concepts of
matrices where the algorithm for matrix multiplication and the concept of the multiplicative inverse
of a matrix are applied.
Using Matrices to encode and decipher messages
The matrix A=[-15-1-21171-52] is used for the following example.
Encoding a message
Step 1: Set up a substitution cipher to encode the message "MATH IS SWEET"
For the cipher, we will associate a unique number to every letter in the alphabet.
This can be done randomly or using a systematic approach. Here we choose to
associate 0 with a blank space, and assign 1 to A,-1 to B,2 to C,-2 to D,
and so on.
Now encode the secret message as shown We next enter the coded message into a new matrix B, by entering it letter by
letter into the columns of B. Note that since the encrypting matrix A is a 33,B
must have a 3 rows for multiplication to be possible.
B=[MHSWTAE???TISE?]=[7-41012-1010030-1051030]
If the message is too short to fill matrix B, we use blank spaces to complete the final
column.
Step 2: Use the matrix A to encrypt it.
Computing the product AB encrypts the message, and only someone with access to
A-1 will be able to read it.
AB=[-15-1117-52]
1
1
-2[7-41012-10003051030]
-10
1
=[8-1-20010435030206303-10]
-18
-73
The coded message is 8,-73,-18,-1,43,6,-20,50,30,0,30,3,10,20 and
-10.
Deciphering a message
Step 3: Decipher the coded message from step 2.
The received message is 8,-73,-18,-1,43,6,-20,50,30,0,30,3,10,20 and
-10. It is the result of the product AB. To find matrix B, we apply A-1 since
A-1(AB)=(A-1A)B=B. Writing the received message in matrix form, we
have
AB=[8-1-20010-7343503020-186303-10] Step 4: , Next multiply AB by A-1 on the left to determine matrix B
A-1(AB)=[-575-461-901]
1
1
-11[8-1-20010435030206303-10]
-18
-73
=[7-41012-10003051030]
-10
1=B
Writing matrix B in sentence form gives 7,1,-10,-4,0,5,10,0,10,12,3,3,-10,
0&0 and using the substitution cipher to replace numbers with letters,
reveals the message MATH IS SWEET.
Activity 1(Unlock a coded message)
Doctor Strange is in deep trouble. He is being pursed by Thanos and is presently hiding in a secret
location to escape from being captured by him. He needs to send messages to two of his comrades,
Thor and Captain America, to tell them about his situation and whereabouts. As such, he composes
his first message by replacing each letter in the message by a number according to the code in
Table 1 below.
Table 1: Coding system
As Doctor Strange is afraid that his message will be intercepted and cracked by Thanos, therefore,
he decides to send the message in code together with a super hi-tech LOCK to Thor and Captain
America to unlock the coded message.
LOCK =[101-110012]
With the use of Table 1 and LOCK, what is the message that Doctor Strange is trying to send to Thor
and Captain America? Please show your working clearly on how you unlock the code message. Activity 2(Design your own substitution cipher)
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Harness The Power Of Big Data The IBM Big Data Platform

Authors: Paul Zikopoulos, David Corrigan James Giles Thomas Deutsch Krishnan Parasuraman Dirk DeRoos Paul Zikopoulos

1st Edition

0071808183, 9780071808187

More Books

Students also viewed these Databases questions

Question

What are the purposes of performance appraisals?

Answered: 1 week ago