0% found this document useful (0 votes)
50 views

Cryptography

The document discusses cryptography and Hill ciphers. It defines cryptography as encoding and decoding secret messages. It explains that cryptography involves encrypting plaintext into ciphertext using ciphers. The simplest ciphers are substitution ciphers that replace each letter with another letter. Hill ciphers are an improvement that encrypt letter pairs instead of individual letters to make the code harder to break statistically. It provides an example of encrypting a message using a Hill cipher matrix.

Uploaded by

Ergi Canollari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Cryptography

The document discusses cryptography and Hill ciphers. It defines cryptography as encoding and decoding secret messages. It explains that cryptography involves encrypting plaintext into ciphertext using ciphers. The simplest ciphers are substitution ciphers that replace each letter with another letter. Hill ciphers are an improvement that encrypt letter pairs instead of individual letters to make the code harder to break statistically. It provides an example of encrypting a message using a Hill cipher matrix.

Uploaded by

Ergi Canollari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography (10.

14, Anton, Elementary Linear


Algebra 11 ed)
The study of encoding and decoding secret messages is called cryptography. Although secret codes date
to the earliest days of written communication, there has been a recent surge of interest in the subject
because of the need to maintain the privacy of information transmitted over public lines of
communication. In the language of cryptography, codes are called ciphers, uncoded messages are called
plaintext, and coded messages are called ciphertext. The process of converting from plaintext to
ciphertext is called enciphering, and the reverse process of converting from ciphertext to plaintext is
called deciphering. The simplest ciphers, called substitution ciphers, are those that replace each letter of
the alphabet by a different letter. . For example, in the substitution cipher :

PLAIN: ABCDE F GH I J KL MNOP QR S T UV WXY Z

CIPHER: DEF GH I J KLMNOP QR S T UV WXY Z ABC

the plaintext letter A is replaced by D, the plaintext letter B by E, and so forth. With this cipher the
plaintext message ROME WAS NOT BUILT IN A DAY

HILL CIPHERS -A disadvantage of substitution ciphers is that they preserve the frequencies of individual
letters, making it relatively easy to break the code by statistical methods. One way to overcome this
problem is to divide the plaintext into groups of letters and encipher the plaintext group by group,
rather than one letter at a time. A system of cryptography in which the plaintext is divided into sets of n
letters, each of which is replaced by a set of n cipher letters, is called a polygraphic system. In this
section we will study a class of polygraphic systems based on matrix transformations. [The ciphers that
we will discuss are called Hill ciphers after Lester S. Hill, who introduced them in two papers:
“Cryptography in an Algebraic Alphabet,” American Mathematical Monthly, 36 (June– July 1929), pp.
306–312; and “Concerning Certain Linear Transformation Apparatus of Cryptography,” American
Mathematical Monthly, 38 (March 1931), pp. 135–154.] In the discussion to follow, we assume that each
plaintext and ciphertext letter except Z is assigned the numerical value that specifies its position in the
standard alphabet (Table 1). For reasons that will become clear later, Z is assigned a value of zero.

EXAMPLE 1-Hill Cipher of a Message

Use the matrix to obtain the Hill cipher for the plaintext message.

I AM HIDING
Solution If we group the plaintext into pairs and add the dummy letter G to fill out the last pair, we
obtain

IA MH ID IN GG

or, equivalently, from Table

1, 9 1 13 8 9 4 9 14 7 7

To encipher the pair IA, we form the matrix product

which, from Table 1, yields the ciphertext KC. To encipher the pair MH, we form the product:

You might also like