An Introduction to Hill Ciphers Using Linear Algebra

Size: px
Start display at page:

Download "An Introduction to Hill Ciphers Using Linear Algebra"

Transcription

1 An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH

2 Contents 1 Introduction Substitution Ciphers Hill Ciphers Alphabets Modular Arithmetic Modulus Modular Inverses Matrices 3.1 Invertible Matrices Adjugates Hill-2 Ciphers Choosing Matrices Encryption Decryption Hill-3 Ciphers Choosing Matrices Encryption Decryption Conclusion 23 7 References 24 2

3 1 Introduction Hill ciphers were invented by ester S. Hill in A Hill cipher is a type of polygraphic substitution cipher. A Hill cipher uses linear algebraic operations on an n n matrix to encrypt and decrypt messages. Hill ciphers were the rst polygraphic ciphers where it was practical to operate on more than three symbols at once. 1.1 Substitution Ciphers Substitution ciphers work by substituting one letter with another using a set of rules that can be reversed to decrypt an encrypted message. Simple substitution ciphers simply change one letter to another. You can see a simple substitution assignment table in Table I. Table I: etter to etter Substitution A B C D E F G H I J K M N O P Q R S T U V W X Y Z Q W E R T Y U I O P A S D F G H J K Z X C V B N M In order to encrypt the message HEO WORD, you simply replace each letter with the corresponding letter below it to get the message ITSSG VGKSR. The encrypted message may look like gibberish, but simple substitution ciphers are relatively easy to break using frequency analysis. Frequency analysis uses the fact that the letter E is more likely to appear in an English phrase than the letter X, etc. If you look at the encrypted message, the two 's in HEO appear as S's in ITSSG giving even more clues to someone trying to crack the code. A polygraphic cipher encrypts letters in larger groups, making frequency analysis more dicult. Encrypting HEO WORD using a polygraphic cipher might yield something like JVDNE ANAEZ. Note that the 's in HEO WORD no longer give an easy clue as to what the word might be. Polygraphic ciphers are not unbreakable and are still vulnerable to frequency analysis, but it takes a much larger sample of encrypted data to break the code than a simple substitution cipher. 1.2 Hill Ciphers Hill ciphers are a type of polygraphic substitution cipher. They use matrices and linear algebraic operations to encrypt and decrypt messages. Encrypting a message with a Hill cipher starts by assigning each letter in the alphabet a unique number between 0 and 25. You can see a typical assignment in Table II. 3

4 Table II: etter to Number Substitution A B C D E F G H I J K M N O P Q R S T U V W X Y Z An n n matrix is chosen to encrypt the message. This n n matrix needs to have certain properties for an encrypted message to be able to be decrypted. These properties will be explained later on in this paper. For right now the 1 2 matrix A will be used. Once the encryption matrix has been chosen, the message to be encrypted needs to be broken into n 1 vectors. To encrypt HI CIPHER, using matrix A, break it into 2 x 1 vectors: H I C I P H E R Use Table II to convert each letter in the vectors to its representative number: H I 7 C I 2 P H 16 7 E R

5 Multiply each of these numeric vectors by the matrix A to get the encrypted vectors: To get the encrypted message, you should be able to use Table II to change the encrypted message from numbers back to letters, but there is one more step. 23 If you look at the rst encrypted vector,, the rst number, 23, can be 53 changed to X using Table II, but there is no entry in Table II for 53. In order to use Table II, you need numbers between 0 and 25. If you take the Modulus 26 of 53, you will get 1, which is between 0 and 25 and can be translated to B using Table II. Modulus will be discussed later in this paper. 5

6 If you take the Modulus 26 of each of the encrypted vectors, you get: Mod 26 Mod 26 Mod 26 Mod Mod 26 2 Now you can take the encrypted vectors and get encrypted letter values from Table II to get the encrypted message XBRZSMEYMC. The example above is an example of a Hill-2 Cipher. The 2 comes from the number of columns in the encryption and decryption matrices. A Hill cipher using 4 4 matrices is known as a Hill-4 Cipher, etc. 1.3 Alphabets In the examples used in this paper Table II from section 1.2 will be used to convert letters into numbers and vice versa. This table uses the standard 26 character alphabet used in English. Because you have 26 characters that you will use to encrypt and decrypt, you need to make sure that everything can be converted into an actual letter. The letters are assigned numbers between 0 and 25 so that you can take advantage of Mod 26 arithmetic to convert any number into a number between 0 and 25. Hill ciphers do not have to use exactly 26 characters. Using Hill ciphers with non-english character sets can yield alphabets with more or less than 26 characters. You can also include space and punctuation characters. Also, the numbers do not need to be in order. It helps to start with 0 in your numbering to take advantage of modular arithmetic. Of course, if your alphabet uses more or less than 26 characters, make sure you use the appropriate Mod m instead of Mod 26. The key is that the same alphabet with the same letter to number designations need to be available for the encryptor and decryptor and that there are no gaps in the numbering. 6

7 2 Modular Arithmetic 2.1 Modulus A modulus of one number in terms of another number (a Mod b) for integers a and b basically means that you divide a by b and take the remainder as the answer. For example: therefore, also, R 4 14 Mod Mod 10 4 Here is a theorem for how to calculate modulus: THEOREM: For an integer a and modulus m, let R remainder of a m Then the residue r of a modulus m is given by: R if a 0 r m R if a < 0 and R 0 0 if a < 0 and R 0 When you are using Hill ciphers, you will use modulus (specically Mod 26 for the alphabet used in this paper) in every step to make sure that you are dealing with numbers between 0 and 25. Here are some examples: 1. 0 Mod R Mod Mod Mod R 2-0 < 0 and Mod R 0-52 < 0 and Mod

8 2.2 Modular Inverses In regular arithmetic, every non-zero number a has a reciprocal (or inverse) a 1 such that: a a 1 1 For example, the inverse of 23 is 1 23 because In modular arithmetic, a number a has a modular inverse a 1 for a number m such that: (a a 1 ) Mod m 1 IMPORTANT NOTE: For modular inverses, a and m must not have any common prime factors in order for a 1 to exist. Example: Find the modular inverse of 9 for Mod 26. Solution: Mod is the modular inverse of 9 for Mod 26. In order to create matrices for Hill ciphers, you will need to know the modular inverses for Mod 26. Because 26 has only 2 prime factors (2 and 13), the numbers for which there is a modular inverse for Mod 26 include all the odd numbers between 1 and 25 except for 13. Table III shows all of the possible modular inverses for Mod 26. Table III: Modular Inverses for Mod 26 a a Matrices 3.1 Invertible Matrices In order for a matrix to be invertible, it must rst be a square n n matrix. It must also have a determinant 0. a b For a 2 2 matrix A, the determinant of A is ad - bc, written as c d det A ad - bc

9 For square matrices larger than 2 2 it gets a little more complicated: DEFINITION: For n 2, the determinant of an n n matrix A a ij is the sum of n terms of the form ±a 1j det A 1j, with plus and minus signs alternating, where the entries a, a 12,..., a 1n are from the rst row of A. In symbols det A a det A - a 12 det A (-1) 1+n a 1n det A 1n a b c So, for a 3 3 matrix B d e f, g h i e f det B a det h i d f - b det g i d e + c g h det B a (ei - fh) - b (di - fg) + c (dh - eg) 3.2 Adjugates An adjugate of a square matrix can be used to generate an inverse of that matrix. You will need to use adjugates to calculate the modular inverse your encryption matrix to use in decryption. To create an adjugate of a square, n n invertible matrix A, take all of the cofactors of A, put them into a matrix B and then take the transpose of B, written as B T. a b For a 2 2 matrix A, the cofactors are: c d C + d C 12 - c C 21 - b C 22 + a d c The resulting matrix B b a d b and B T c a d b Therefore, adj A c a 9

10 4 Hill-2 Ciphers 4.1 Choosing Matrices A Hill-2 Cipher uses a 2 2 invertible matrix A to encrypt data and another 2 2 invertible matrix B to decrypt data. The relationship between A and B is that they need to be modular inverses of each other for Mod 26. This means you need to choose a matrix A where there exists a matrix B such that: (A B) Mod 26 I n where I n is the identity matrix for n n matrices. In order to create B, you must rst calculate the determinant of A. et A 2 1 det A (2 4) - (1 3) modular inverse of 5 for Mod (from Table III) If det A did not have a modular inverse for Mod 26, you would NOT be able to use A to encrypt and decrypt Hill ciphers. IMPORTANT NOTE: In order for a n n matrix A to be modularly invertible for Mod m, det A MUST have a modular inverse for Mod m. a b You saw in section 3.2 that the adjudicate of a 2 2 matrix c d d b. Therefore c a adj A To calculate B you need to multiply the adjucate of A by the modular inverse of det A for Mod m and then calculate Mod m for the entries in the resulting matrix. For example: B B Mod

11 6 5 Therefore 2 1 is the modular inverse of 6 5 for Mod 26. is the matrix you would use to decrypt a Hill cipher encrypted using To check that is the modular inverse of Mod I 2 : Encryption Here is how to encrypt the phrase HEO WORD. You can use the matrix 2 1 to encrypt it because you know it has a modular inverse from the 6 5 previous section ( ). 1. Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. H E 7 4 O W O R D 3

12 Multiply each of the numerical vectors by the encryption matrix, Convert each of the resulting numerical vectors to Mod Mod 26 Mod Mod 26 0 Mod Mod

13 4. Use Table II to convert each of the values in the resulting vectors back to letters. 1 S 7 25 H Z 24 0 Y A 19 6 T G Z T 5. The encrypted message now reads SHZYATGZT. 4.3 Decryption The process to decrypt the phrase SHZYATGZT similar to encryption, except we need to use the modular inverse of the original encryption matrix, which is

14 1. Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. S 1 H Z 7 25 Y A 24 0 T G 19 6 Z T Multiply each of the numerical vectors by the decryption matrix,

15 3. Convert each of the resulting numerical vectors to Mod Mod 26 4 Mod 26 Mod 26 Mod Mod Use Table II to convert each of the values in the resulting vectors back to letters. 7 H 4 E O W O R 3 D 5. The decrypted message is now HEOWORD which can easily be deciphered as HEO WORD. 15

16 5 Hill-3 Ciphers 5.1 Choosing Matrices A Hill-3 Cipher uses a 3 3 invertible matrix A to encrypt data and another 3 x 3 invertible matrix B to decrypt data. You might choose a matrix A If you calculate the det A you get: det det det (6 + 1) (-9-2) (3-4) det A Mod 26 0 If you look at Table III, there is no entry for 0, so there is no modular inverse. Because of this, matrix A won't work. While you could certainly encrypt messages with matrix A, there would be no way to decrypt them. If you modify matrix A to det det det , here is the determinant: 1 (6 + 1) (-4-3) (2-9) det A Mod

17 If you look at Table III, you can see that the modular inverse of 9 3. To calculate B you need to multiply the adjucate of A (adj A) by the modular inverse of det A for Mod m and then calculate Mod m for the entries in the resulting matrix. To calculate adj A: 3 1 C + det C 21 - det C 31 + det C 12 - det C 22 + det C 32 - det C 13 + det C 23 - det C 33 + det 2 3 C (6 - (-1)) 7 C 12 -(-4-3) 7 C 13 (2-9) -7 C 21 -(4-2) -2 C 22 (2 - (-6)) C 23 -(-1-6) 7 C 31 (2 - (-6)) C 32 -(1-4) 3 C 33 (3 - (-4)) 7 You can take the results and put them into a new matrix C and now adj A C T. adj A Now you can calculate the modular inverse of A: B B Mod Therefore is the modular inverse of Mod encrypted using for is the matrix you would use to decrypt a Hill cipher 17

18 To check that is the modular inverse of : Mod I Encryption Here is how to encrypt thephrase HEO WORD using a Hill-3 Cipher The encryption matrix A and the decryption matrix B

19 1. Divide the phrase to encrypt into 3 1 vectors and assign them numbers using Table II. H E 7 4 O W O R D X X You will notice that there are not enough letters to completely ll out the last vector. One common solution is to just repeat the nal letter to ll out the nal vector. Another solution, the one used here, is to ll out the nal vector with uncommonly used letters, such as X. 2. Multiply each of the numerical vectors by the encryption matrix,

20 3. Convert each of the resulting numerical vectors to Mod Mod Mod Mod 26 Mod Use Table II to convert each of the values in the resulting vectors back to letters T J N V Q A I V The encrypted message now reads TJNVQAIVDIG. D I G 20

21 5.3 Decryption The process to decrypt the phrase TJNVQAIVDIG similar to encryption, except we need to use the modular inverse of the original encryption matrix, which is Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. T J N V Q A I V 0 21 D I G

22 2. Multiply each of the numerical vectors by the decryption matrix, Convert each of the resulting numerical vectors to Mod Mod Mod Mod 26 Mod

23 4. Use Table II to convert each of the values in the resulting vectors back to letters. 7 4 H E O W The decrypted message is now HEOWORDXX which can easily be deciphered as HEO WORD. O R D X X 6 Conclusion The most dicult part of creating Hill ciphers is determining the encryption and decryption matrices. Once you have a viable encryption matrix and its corresponding decryption matrix, it is relatively easy to encrypt and decrypt messages, if you have a working knowledge of matrix arithmetic and how modulus works. 23

24 7 References ester S. Hill, Cryptography in an Algebraic Alphabet, The American Mathematical Monthly Vol. 36, June-July 1929, pp ester S. Hill, Concerning Certain inear Transformation Apparatus of Cryptography, The American Mathematical Monthly Vol. 3, 1931, pp Howard Anton, Chris Rorres, Elementary inear Algebra with Applications, John Wiley and Sons, Inc., New York, NY, pp David C. ay, inear Algebra and Its Applications, Pearson, Addison Wesley, Boston, Massachusetts, pp 121, 17,

Introduction to Hill cipher

Introduction to Hill cipher Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

Solutions to Problem Set 1

Solutions to Problem Set 1 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational

More information

Hill Ciphers and Modular Linear Algebra

Hill Ciphers and Modular Linear Algebra Hill Ciphers and Modular Linear Algebra Murray Eisenberg November 3, 1999 Hill ciphers are an application of linear algebra to cryptology (the science of making and breaking codes and ciphers). Below we

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +

More information

8 Square matrices continued: Determinants

8 Square matrices continued: Determinants 8 Square matrices continued: Determinants 8. Introduction Determinants give us important information about square matrices, and, as we ll soon see, are essential for the computation of eigenvalues. You

More information

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

More information

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.

More information

Lecture 2 Matrix Operations

Lecture 2 Matrix Operations Lecture 2 Matrix Operations transpose, sum & difference, scalar multiplication matrix multiplication, matrix-vector product matrix inverse 2 1 Matrix transpose transpose of m n matrix A, denoted A T or

More information

Matrices 2. Solving Square Systems of Linear Equations; Inverse Matrices

Matrices 2. Solving Square Systems of Linear Equations; Inverse Matrices Matrices 2. Solving Square Systems of Linear Equations; Inverse Matrices Solving square systems of linear equations; inverse matrices. Linear algebra is essentially about solving systems of linear equations,

More information

Solving Systems of Linear Equations Using Matrices

Solving Systems of Linear Equations Using Matrices Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.

More information

Linear Algebra Notes for Marsden and Tromba Vector Calculus

Linear Algebra Notes for Marsden and Tromba Vector Calculus Linear Algebra Notes for Marsden and Tromba Vector Calculus n-dimensional Euclidean Space and Matrices Definition of n space As was learned in Math b, a point in Euclidean three space can be thought of

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS

December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation

More information

Name: Section Registered In:

Name: Section Registered In: Name: Section Registered In: Math 125 Exam 3 Version 1 April 24, 2006 60 total points possible 1. (5pts) Use Cramer s Rule to solve 3x + 4y = 30 x 2y = 8. Be sure to show enough detail that shows you are

More information

Notes on Determinant

Notes on Determinant ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without

More information

Linearly Independent Sets and Linearly Dependent Sets

Linearly Independent Sets and Linearly Dependent Sets These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation

More information

Solving Linear Systems, Continued and The Inverse of a Matrix

Solving Linear Systems, Continued and The Inverse of a Matrix , Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing

More information

Question 2: How do you solve a matrix equation using the matrix inverse?

Question 2: How do you solve a matrix equation using the matrix inverse? Question : How do you solve a matrix equation using the matrix inverse? In the previous question, we wrote systems of equations as a matrix equation AX B. In this format, the matrix A contains the coefficients

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

Solving simultaneous equations using the inverse matrix

Solving simultaneous equations using the inverse matrix Solving simultaneous equations using the inverse matrix 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix

More information

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet

More information

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections

More information

MATHEMATICS FOR ENGINEERS BASIC MATRIX THEORY TUTORIAL 2

MATHEMATICS FOR ENGINEERS BASIC MATRIX THEORY TUTORIAL 2 MATHEMATICS FO ENGINEES BASIC MATIX THEOY TUTOIAL This is the second of two tutorials on matrix theory. On completion you should be able to do the following. Explain the general method for solving simultaneous

More information

Math 115A HW4 Solutions University of California, Los Angeles. 5 2i 6 + 4i. (5 2i)7i (6 + 4i)( 3 + i) = 35i + 14 ( 22 6i) = 36 + 41i.

Math 115A HW4 Solutions University of California, Los Angeles. 5 2i 6 + 4i. (5 2i)7i (6 + 4i)( 3 + i) = 35i + 14 ( 22 6i) = 36 + 41i. Math 5A HW4 Solutions September 5, 202 University of California, Los Angeles Problem 4..3b Calculate the determinant, 5 2i 6 + 4i 3 + i 7i Solution: The textbook s instructions give us, (5 2i)7i (6 + 4i)(

More information

Lecture 1: Systems of Linear Equations

Lecture 1: Systems of Linear Equations MTH Elementary Matrix Algebra Professor Chao Huang Department of Mathematics and Statistics Wright State University Lecture 1 Systems of Linear Equations ² Systems of two linear equations with two variables

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.

MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column

More information

HFCC Math Lab Beginning Algebra 13 TRANSLATING ENGLISH INTO ALGEBRA: WORDS, PHRASE, SENTENCES

HFCC Math Lab Beginning Algebra 13 TRANSLATING ENGLISH INTO ALGEBRA: WORDS, PHRASE, SENTENCES HFCC Math Lab Beginning Algebra 1 TRANSLATING ENGLISH INTO ALGEBRA: WORDS, PHRASE, SENTENCES Before being able to solve word problems in algebra, you must be able to change words, phrases, and sentences

More information

MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS

MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS Class Meetings: MW 2:00-3:15 pm in Physics 144, September 7 to December 14 [Thanksgiving break November 23 27; final exam December 21] Instructor:

More information

Typical Linear Equation Set and Corresponding Matrices

Typical Linear Equation Set and Corresponding Matrices EWE: Engineering With Excel Larsen Page 1 4. Matrix Operations in Excel. Matrix Manipulations: Vectors, Matrices, and Arrays. How Excel Handles Matrix Math. Basic Matrix Operations. Solving Systems of

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Some practice problems for midterm 2

Some practice problems for midterm 2 Some practice problems for midterm 2 Kiumars Kaveh November 15, 2011 Problem: What is the remainder of 6 2000 when divided by 11? Solution: This is a long-winded way of asking for the value of 6 2000 mod

More information

Using row reduction to calculate the inverse and the determinant of a square matrix

Using row reduction to calculate the inverse and the determinant of a square matrix Using row reduction to calculate the inverse and the determinant of a square matrix Notes for MATH 0290 Honors by Prof. Anna Vainchtein 1 Inverse of a square matrix An n n square matrix A is called invertible

More information

Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system

Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical

More information

The Characteristic Polynomial

The Characteristic Polynomial Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem

More information

Factorizations: Searching for Factor Strings

Factorizations: Searching for Factor Strings " 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

Sequences. A sequence is a list of numbers, or a pattern, which obeys a rule.

Sequences. A sequence is a list of numbers, or a pattern, which obeys a rule. Sequences A sequence is a list of numbers, or a pattern, which obeys a rule. Each number in a sequence is called a term. ie the fourth term of the sequence 2, 4, 6, 8, 10, 12... is 8, because it is the

More information

Linear Algebra Notes

Linear Algebra Notes Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note

More information

CONTENTS. Please note:

CONTENTS. Please note: CONTENTS Introduction...iv. Number Systems... 2. Algebraic Expressions.... Factorising...24 4. Solving Linear Equations...8. Solving Quadratic Equations...0 6. Simultaneous Equations.... Long Division

More information

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system 1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables

More information

8.2. Solution by Inverse Matrix Method. Introduction. Prerequisites. Learning Outcomes

8.2. Solution by Inverse Matrix Method. Introduction. Prerequisites. Learning Outcomes Solution by Inverse Matrix Method 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix algebra allows us

More information

Properties of Real Numbers

Properties of Real Numbers 16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should

More information

Solution to Exercise 2.2. Both m and n are divisible by d, som = dk and n = dk. Thus m ± n = dk ± dk = d(k ± k ),som + n and m n are divisible by d.

Solution to Exercise 2.2. Both m and n are divisible by d, som = dk and n = dk. Thus m ± n = dk ± dk = d(k ± k ),som + n and m n are divisible by d. [Chap. ] Pythagorean Triples 6 (b) The table suggests that in every primitive Pythagorean triple, exactly one of a, b,orc is a multiple of 5. To verify this, we use the Pythagorean Triples Theorem to write

More information

1.2 Solving a System of Linear Equations

1.2 Solving a System of Linear Equations 1.. SOLVING A SYSTEM OF LINEAR EQUATIONS 1. Solving a System of Linear Equations 1..1 Simple Systems - Basic De nitions As noticed above, the general form of a linear system of m equations in n variables

More information

V55.0106 Quantitative Reasoning: Computers, Number Theory and Cryptography

V55.0106 Quantitative Reasoning: Computers, Number Theory and Cryptography V55.0106 Quantitative Reasoning: Computers, Number Theory and Cryptography 3 Congruence Congruences are an important and useful tool for the study of divisibility. As we shall see, they are also critical

More information

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Introduction To Security and Privacy Einführung in die IT-Sicherheit I Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/

More information

Direct Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations.

Direct Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations. Section 1 Mathematics has a language all its own. In order to be able to solve many types of word problems, we need to be able to translate the English Language into Math Language. is the process of translating

More information

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people

More information

Operation Count; Numerical Linear Algebra

Operation Count; Numerical Linear Algebra 10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point

More information

Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving

Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving Section 7 Algebraic Manipulations and Solving Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving Before launching into the mathematics, let s take a moment to talk about the words

More information

Unit 18 Determinants

Unit 18 Determinants Unit 18 Determinants Every square matrix has a number associated with it, called its determinant. In this section, we determine how to calculate this number, and also look at some of the properties of

More information

We can express this in decimal notation (in contrast to the underline notation we have been using) as follows: 9081 + 900b + 90c = 9001 + 100c + 10b

We can express this in decimal notation (in contrast to the underline notation we have been using) as follows: 9081 + 900b + 90c = 9001 + 100c + 10b In this session, we ll learn how to solve problems related to place value. This is one of the fundamental concepts in arithmetic, something every elementary and middle school mathematics teacher should

More information

An Introduction to the RSA Encryption Method

An Introduction to the RSA Encryption Method April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems

More information

Computing exponents modulo a number: Repeated squaring

Computing exponents modulo a number: Repeated squaring Computing exponents modulo a number: Repeated squaring How do you compute (1415) 13 mod 2537 = 2182 using just a calculator? Or how do you check that 2 340 mod 341 = 1? You can do this using the method

More information

Solution to Homework 2

Solution to Homework 2 Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if

More information

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational

More information

Chapter 3. if 2 a i then location: = i. Page 40

Chapter 3. if 2 a i then location: = i. Page 40 Chapter 3 1. Describe an algorithm that takes a list of n integers a 1,a 2,,a n and finds the number of integers each greater than five in the list. Ans: procedure greaterthanfive(a 1,,a n : integers)

More information

Matrix Algebra. Some Basic Matrix Laws. Before reading the text or the following notes glance at the following list of basic matrix algebra laws.

Matrix Algebra. Some Basic Matrix Laws. Before reading the text or the following notes glance at the following list of basic matrix algebra laws. Matrix Algebra A. Doerr Before reading the text or the following notes glance at the following list of basic matrix algebra laws. Some Basic Matrix Laws Assume the orders of the matrices are such that

More information

Grade 6 Math Circles. Binary and Beyond

Grade 6 Math Circles. Binary and Beyond Faculty of Mathematics Waterloo, Ontario N2L 3G1 The Decimal System Grade 6 Math Circles October 15/16, 2013 Binary and Beyond The cool reality is that we learn to count in only one of many possible number

More information

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards

More information

Abstract: We describe the beautiful LU factorization of a square matrix (or how to write Gaussian elimination in terms of matrix multiplication).

Abstract: We describe the beautiful LU factorization of a square matrix (or how to write Gaussian elimination in terms of matrix multiplication). MAT 2 (Badger, Spring 202) LU Factorization Selected Notes September 2, 202 Abstract: We describe the beautiful LU factorization of a square matrix (or how to write Gaussian elimination in terms of matrix

More information

Abstract Algebra Cheat Sheet

Abstract Algebra Cheat Sheet Abstract Algebra Cheat Sheet 16 December 2002 By Brendan Kidwell, based on Dr. Ward Heilman s notes for his Abstract Algebra class. Notes: Where applicable, page numbers are listed in parentheses at the

More information

Here are some examples of combining elements and the operations used:

Here are some examples of combining elements and the operations used: MATRIX OPERATIONS Summary of article: What is an operation? Addition of two matrices. Multiplication of a Matrix by a scalar. Subtraction of two matrices: two ways to do it. Combinations of Addition, Subtraction,

More information

University of Lille I PC first year list of exercises n 7. Review

University of Lille I PC first year list of exercises n 7. Review University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

1 Determinants and the Solvability of Linear Systems

1 Determinants and the Solvability of Linear Systems 1 Determinants and the Solvability of Linear Systems In the last section we learned how to use Gaussian elimination to solve linear systems of n equations in n unknowns The section completely side-stepped

More information

26. Determinants I. 1. Prehistory

26. Determinants I. 1. Prehistory 26. Determinants I 26.1 Prehistory 26.2 Definitions 26.3 Uniqueness and other properties 26.4 Existence Both as a careful review of a more pedestrian viewpoint, and as a transition to a coordinate-independent

More information

Solving Systems of Linear Equations

Solving Systems of Linear Equations LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

Introduction to Matrix Algebra

Introduction to Matrix Algebra Psychology 7291: Multivariate Statistics (Carey) 8/27/98 Matrix Algebra - 1 Introduction to Matrix Algebra Definitions: A matrix is a collection of numbers ordered by rows and columns. It is customary

More information

MAT 200, Midterm Exam Solution. a. (5 points) Compute the determinant of the matrix A =

MAT 200, Midterm Exam Solution. a. (5 points) Compute the determinant of the matrix A = MAT 200, Midterm Exam Solution. (0 points total) a. (5 points) Compute the determinant of the matrix 2 2 0 A = 0 3 0 3 0 Answer: det A = 3. The most efficient way is to develop the determinant along the

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}

More information

No Solution Equations Let s look at the following equation: 2 +3=2 +7

No Solution Equations Let s look at the following equation: 2 +3=2 +7 5.4 Solving Equations with Infinite or No Solutions So far we have looked at equations where there is exactly one solution. It is possible to have more than solution in other types of equations that are

More information

PYTHAGOREAN TRIPLES KEITH CONRAD

PYTHAGOREAN TRIPLES KEITH CONRAD PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

Linear Equations in One Variable

Linear Equations in One Variable Linear Equations in One Variable MATH 101 College Algebra J. Robert Buchanan Department of Mathematics Summer 2012 Objectives In this section we will learn how to: Recognize and combine like terms. Solve

More information

Grade 7/8 Math Circles Fall 2012 Factors and Primes

Grade 7/8 Math Circles Fall 2012 Factors and Primes 1 University of Waterloo Faculty of Mathematics Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Fall 2012 Factors and Primes Factors Definition: A factor of a number is a whole

More information

[1] Diagonal factorization

[1] Diagonal factorization 8.03 LA.6: Diagonalization and Orthogonal Matrices [ Diagonal factorization [2 Solving systems of first order differential equations [3 Symmetric and Orthonormal Matrices [ Diagonal factorization Recall:

More information

The application of prime numbers to RSA encryption

The application of prime numbers to RSA encryption The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered

More information

Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan

Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 3 Binary Operations We are used to addition and multiplication of real numbers. These operations combine two real numbers

More information

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

More information

Content. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11

Content. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11 Content Credits 11 Chapter 1 Arithmetic Refresher 13 1.1 Algebra 14 Real Numbers 14 Real Polynomials 19 1.2 Equations in one variable 21 Linear Equations 21 Quadratic Equations 22 1.3 Exercises 28 Chapter

More information

Use of Linear Algebra in Cryptography

Use of Linear Algebra in Cryptography Use of Linear Algebra in Cryptography Hong-Jian Lai Department of Mathematics West Virginia University Morgantown, WV p. 1/?? Creating a Matrix Problem: To create a matrix A = 1 2 3 4 5 6 7 8 10. p. 2/??

More information

CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

CHAPTER 5. Number Theory. 1. Integers and Division. Discussion CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a

More information

Caesar Ciphers: An Introduction to Cryptography

Caesar Ciphers: An Introduction to Cryptography Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

Session 6 Number Theory

Session 6 Number Theory Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple

More information

Math 319 Problem Set #3 Solution 21 February 2002

Math 319 Problem Set #3 Solution 21 February 2002 Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod

More information

160 CHAPTER 4. VECTOR SPACES

160 CHAPTER 4. VECTOR SPACES 160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results

More information

POLYNOMIAL FUNCTIONS

POLYNOMIAL FUNCTIONS POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Linear Programming. March 14, 2014

Linear Programming. March 14, 2014 Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1

More information