0% found this document useful (0 votes)
12 views12 pages

10.2. The Mathematical System Cryptology2

The document discusses the principles of cryptology, including the processes of encryption and decryption, and provides examples of transforming plaintext into ciphertext using numerical equivalents for letters. It explains how to shift letters in the alphabet to encode and decode messages, illustrating these concepts with specific examples. Additionally, it presents mathematical formulas for encoding and decoding messages based on modular arithmetic.

Uploaded by

Luna Valerian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views12 pages

10.2. The Mathematical System Cryptology2

The document discusses the principles of cryptology, including the processes of encryption and decryption, and provides examples of transforming plaintext into ciphertext using numerical equivalents for letters. It explains how to shift letters in the alphabet to encode and decode messages, illustrating these concepts with specific examples. Additionally, it presents mathematical formulas for encoding and decoding messages based on modular arithmetic.

Uploaded by

Luna Valerian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

The Mathematical System

ALBERT R. ANTIPUESTO, IE, LPT, MA-Math


Cryptology

• If your names will be translated into numbers following the


sequence of the numbers and letters like 1 = A, 2 = B, 3 =
C, 4 = D, 5 = E, and so on…
• How will your name be read?

•ALBERT
• 1 12 2 5 20
Cryptology
• Cryptology is a study of codes. It is about writing and
solving secret codes. The message that is to be
transformed into code is called the plaintext. When the
message is already transformed into a code, it is now
called a ciphertext. The process of transforming the
message from plaintext to ciphertext is called encryption.
• The reverse process of encryption is called decryption.
Thus, decryption is a process of transforming the
ciphertext into its original message which is the plaintext.
•Consider the plaintext and its corresponding ciphertext below.
•Plaintext: MATHEMATICS IN THE MODERN WORLD
•Ciphertext: RFYMJRFYNHX NS YMJ RTIJWS BTWQI
Cryptology

•Using the coding scheme in Example 1, decrypt the following message:


• TSQNSJ HQFXX
Cryptology

• Below is the numerical equivalents for letters in the English


alphabet:
Cryptology

•Suppose that in transforming the plaintext message into a ciphertext message, we shift m
positions, then the corresponding letter in the ciphertext is given by
•𝑐 ≡ (𝑝 + 𝑚)𝑚𝑜𝑑 26
•where
• p- the numerical equivalent of the plaintext
•c- the numerical equivalent of the ciphertext
Cryptology

• Each letter in Example 1 was shifted 5 positions (𝑚 = 5) to the right. To encrypt the letter
M we have
•𝑐 ≡ (𝑝 + 𝑚)𝑚𝑜𝑑 26
•𝑐 ≡ (13 + 5)𝑚𝑜𝑑 26
•𝑐 ≡ 18 𝑚𝑜𝑑 26
•We solve c ≡ 18 mod 26 by finding an integer from 0,1,2,3,4,5,…25 such that
(c-18)/26 is an integer. Observe that when we substitute the value 18, we get
(18-18)/26 = 0, which is an integer. Thus, c = 18. The 18th letter is R. Thus, M
is coded with R.
Cryptology
•Use cyclical alphabet coding scheme that shifts 8 positions to:
a. Code: CORONA VIRUS DISEASE
b. Decode: EM PMIT IA WVM
•Solution.
•a. Using the formula with 𝑚 = 8 we have

•𝐶 𝑐 ≡ (3 + 8)𝑚𝑜𝑑 26 ≡ 11 𝑚𝑜𝑑 26 ≡ 11 C is coded as K
•𝑂 𝑐 ≡ (15 + 8)𝑚𝑜𝑑 26 ≡ 23 𝑚𝑜𝑑 26 ≡ 23 O is coded as W
• 𝑅 𝑐 ≡ (18 + 8)𝑚𝑜𝑑 26 ≡ 26 𝑚𝑜𝑑 26 ≡ 0 R is coded as Z
• 𝑂 𝑐 ≡ (15 + 8)𝑚𝑜𝑑 26 ≡ 23 𝑚𝑜𝑑 26 ≡ 23 O is coded as W
• 𝑁 𝑐 ≡ (14 + 8)𝑚𝑜𝑑 26 ≡ 22 𝑚𝑜𝑑 26 ≡ 22 N is coded as V
• 𝐴 𝑐 ≡ (1 + 8)𝑚𝑜𝑑 26 ≡ 9 𝑚𝑜𝑑 26 ≡ 9 A is coded as I
• Continuing in this manner, the ciphertext is KWZWVI DQZCA LQAMIAM
Cryptology
•b.Since 𝑚 = 8, 𝑛 = 26 − 8 = 18, the ciphertext is decoded using the congruence
•𝑝 ≡ (𝑐 + 18)𝑚𝑜𝑑 26
•𝐸 𝑝 ≡ (5 + 18)𝑚𝑜𝑑 26 ≡ 23 𝑚𝑜𝑑 26 ≡ 23 E is decoded as W
•𝑀 𝑝 ≡ (13 + 18)𝑚𝑜𝑑 26 ≡ 31 𝑚𝑜𝑑 26 ≡ 5 M is decoded as E
•𝑃 𝑝 ≡ (16 + 18)𝑚𝑜𝑑 26 ≡ 34 𝑚𝑜𝑑 26 ≡ 8 P is decoded as H
•𝑀 𝑝 ≡ (13 + 18)𝑚𝑜𝑑 26 ≡ 31 𝑚𝑜𝑑 26 ≡ 5 M is decoded as E
𝐼 𝑝 ≡ (9 + 18)𝑚𝑜𝑑 26 ≡ 27 𝑚𝑜𝑑 26 ≡ 1
as A 𝑇
• I is decoded

𝑝 ≡ (20 + 18)𝑚𝑜𝑑 26 ≡ 38 𝑚𝑜𝑑 26 ≡ 12 T is decoded as L Continuing, the


decoded message is WE HEAL AS ONE.
Cryptology

• Use the congruence 𝑐 ≡ (3𝑝 + 2)𝑚𝑜𝑑 26


to encode the message BLUE SKY.
Cryptology

• Encode the message by using a cyclical


alphabetic coding scheme: 9 positions;
QUALITY EDUCATION

You might also like