An Introduction to Hill Ciphers Using Linear Algebra
|
|
- Isabella Collins
- 7 years ago
- Views:
Transcription
1 An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH
2 Contents 1 Introduction Substitution Ciphers Hill Ciphers Alphabets Modular Arithmetic Modulus Modular Inverses Matrices 3.1 Invertible Matrices Adjugates Hill-2 Ciphers Choosing Matrices Encryption Decryption Hill-3 Ciphers Choosing Matrices Encryption Decryption Conclusion 23 7 References 24 2
3 1 Introduction Hill ciphers were invented by ester S. Hill in A Hill cipher is a type of polygraphic substitution cipher. A Hill cipher uses linear algebraic operations on an n n matrix to encrypt and decrypt messages. Hill ciphers were the rst polygraphic ciphers where it was practical to operate on more than three symbols at once. 1.1 Substitution Ciphers Substitution ciphers work by substituting one letter with another using a set of rules that can be reversed to decrypt an encrypted message. Simple substitution ciphers simply change one letter to another. You can see a simple substitution assignment table in Table I. Table I: etter to etter Substitution A B C D E F G H I J K M N O P Q R S T U V W X Y Z Q W E R T Y U I O P A S D F G H J K Z X C V B N M In order to encrypt the message HEO WORD, you simply replace each letter with the corresponding letter below it to get the message ITSSG VGKSR. The encrypted message may look like gibberish, but simple substitution ciphers are relatively easy to break using frequency analysis. Frequency analysis uses the fact that the letter E is more likely to appear in an English phrase than the letter X, etc. If you look at the encrypted message, the two 's in HEO appear as S's in ITSSG giving even more clues to someone trying to crack the code. A polygraphic cipher encrypts letters in larger groups, making frequency analysis more dicult. Encrypting HEO WORD using a polygraphic cipher might yield something like JVDNE ANAEZ. Note that the 's in HEO WORD no longer give an easy clue as to what the word might be. Polygraphic ciphers are not unbreakable and are still vulnerable to frequency analysis, but it takes a much larger sample of encrypted data to break the code than a simple substitution cipher. 1.2 Hill Ciphers Hill ciphers are a type of polygraphic substitution cipher. They use matrices and linear algebraic operations to encrypt and decrypt messages. Encrypting a message with a Hill cipher starts by assigning each letter in the alphabet a unique number between 0 and 25. You can see a typical assignment in Table II. 3
4 Table II: etter to Number Substitution A B C D E F G H I J K M N O P Q R S T U V W X Y Z An n n matrix is chosen to encrypt the message. This n n matrix needs to have certain properties for an encrypted message to be able to be decrypted. These properties will be explained later on in this paper. For right now the 1 2 matrix A will be used. Once the encryption matrix has been chosen, the message to be encrypted needs to be broken into n 1 vectors. To encrypt HI CIPHER, using matrix A, break it into 2 x 1 vectors: H I C I P H E R Use Table II to convert each letter in the vectors to its representative number: H I 7 C I 2 P H 16 7 E R
5 Multiply each of these numeric vectors by the matrix A to get the encrypted vectors: To get the encrypted message, you should be able to use Table II to change the encrypted message from numbers back to letters, but there is one more step. 23 If you look at the rst encrypted vector,, the rst number, 23, can be 53 changed to X using Table II, but there is no entry in Table II for 53. In order to use Table II, you need numbers between 0 and 25. If you take the Modulus 26 of 53, you will get 1, which is between 0 and 25 and can be translated to B using Table II. Modulus will be discussed later in this paper. 5
6 If you take the Modulus 26 of each of the encrypted vectors, you get: Mod 26 Mod 26 Mod 26 Mod Mod 26 2 Now you can take the encrypted vectors and get encrypted letter values from Table II to get the encrypted message XBRZSMEYMC. The example above is an example of a Hill-2 Cipher. The 2 comes from the number of columns in the encryption and decryption matrices. A Hill cipher using 4 4 matrices is known as a Hill-4 Cipher, etc. 1.3 Alphabets In the examples used in this paper Table II from section 1.2 will be used to convert letters into numbers and vice versa. This table uses the standard 26 character alphabet used in English. Because you have 26 characters that you will use to encrypt and decrypt, you need to make sure that everything can be converted into an actual letter. The letters are assigned numbers between 0 and 25 so that you can take advantage of Mod 26 arithmetic to convert any number into a number between 0 and 25. Hill ciphers do not have to use exactly 26 characters. Using Hill ciphers with non-english character sets can yield alphabets with more or less than 26 characters. You can also include space and punctuation characters. Also, the numbers do not need to be in order. It helps to start with 0 in your numbering to take advantage of modular arithmetic. Of course, if your alphabet uses more or less than 26 characters, make sure you use the appropriate Mod m instead of Mod 26. The key is that the same alphabet with the same letter to number designations need to be available for the encryptor and decryptor and that there are no gaps in the numbering. 6
7 2 Modular Arithmetic 2.1 Modulus A modulus of one number in terms of another number (a Mod b) for integers a and b basically means that you divide a by b and take the remainder as the answer. For example: therefore, also, R 4 14 Mod Mod 10 4 Here is a theorem for how to calculate modulus: THEOREM: For an integer a and modulus m, let R remainder of a m Then the residue r of a modulus m is given by: R if a 0 r m R if a < 0 and R 0 0 if a < 0 and R 0 When you are using Hill ciphers, you will use modulus (specically Mod 26 for the alphabet used in this paper) in every step to make sure that you are dealing with numbers between 0 and 25. Here are some examples: 1. 0 Mod R Mod Mod Mod R 2-0 < 0 and Mod R 0-52 < 0 and Mod
8 2.2 Modular Inverses In regular arithmetic, every non-zero number a has a reciprocal (or inverse) a 1 such that: a a 1 1 For example, the inverse of 23 is 1 23 because In modular arithmetic, a number a has a modular inverse a 1 for a number m such that: (a a 1 ) Mod m 1 IMPORTANT NOTE: For modular inverses, a and m must not have any common prime factors in order for a 1 to exist. Example: Find the modular inverse of 9 for Mod 26. Solution: Mod is the modular inverse of 9 for Mod 26. In order to create matrices for Hill ciphers, you will need to know the modular inverses for Mod 26. Because 26 has only 2 prime factors (2 and 13), the numbers for which there is a modular inverse for Mod 26 include all the odd numbers between 1 and 25 except for 13. Table III shows all of the possible modular inverses for Mod 26. Table III: Modular Inverses for Mod 26 a a Matrices 3.1 Invertible Matrices In order for a matrix to be invertible, it must rst be a square n n matrix. It must also have a determinant 0. a b For a 2 2 matrix A, the determinant of A is ad - bc, written as c d det A ad - bc
9 For square matrices larger than 2 2 it gets a little more complicated: DEFINITION: For n 2, the determinant of an n n matrix A a ij is the sum of n terms of the form ±a 1j det A 1j, with plus and minus signs alternating, where the entries a, a 12,..., a 1n are from the rst row of A. In symbols det A a det A - a 12 det A (-1) 1+n a 1n det A 1n a b c So, for a 3 3 matrix B d e f, g h i e f det B a det h i d f - b det g i d e + c g h det B a (ei - fh) - b (di - fg) + c (dh - eg) 3.2 Adjugates An adjugate of a square matrix can be used to generate an inverse of that matrix. You will need to use adjugates to calculate the modular inverse your encryption matrix to use in decryption. To create an adjugate of a square, n n invertible matrix A, take all of the cofactors of A, put them into a matrix B and then take the transpose of B, written as B T. a b For a 2 2 matrix A, the cofactors are: c d C + d C 12 - c C 21 - b C 22 + a d c The resulting matrix B b a d b and B T c a d b Therefore, adj A c a 9
10 4 Hill-2 Ciphers 4.1 Choosing Matrices A Hill-2 Cipher uses a 2 2 invertible matrix A to encrypt data and another 2 2 invertible matrix B to decrypt data. The relationship between A and B is that they need to be modular inverses of each other for Mod 26. This means you need to choose a matrix A where there exists a matrix B such that: (A B) Mod 26 I n where I n is the identity matrix for n n matrices. In order to create B, you must rst calculate the determinant of A. et A 2 1 det A (2 4) - (1 3) modular inverse of 5 for Mod (from Table III) If det A did not have a modular inverse for Mod 26, you would NOT be able to use A to encrypt and decrypt Hill ciphers. IMPORTANT NOTE: In order for a n n matrix A to be modularly invertible for Mod m, det A MUST have a modular inverse for Mod m. a b You saw in section 3.2 that the adjudicate of a 2 2 matrix c d d b. Therefore c a adj A To calculate B you need to multiply the adjucate of A by the modular inverse of det A for Mod m and then calculate Mod m for the entries in the resulting matrix. For example: B B Mod
11 6 5 Therefore 2 1 is the modular inverse of 6 5 for Mod 26. is the matrix you would use to decrypt a Hill cipher encrypted using To check that is the modular inverse of Mod I 2 : Encryption Here is how to encrypt the phrase HEO WORD. You can use the matrix 2 1 to encrypt it because you know it has a modular inverse from the 6 5 previous section ( ). 1. Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. H E 7 4 O W O R D 3
12 Multiply each of the numerical vectors by the encryption matrix, Convert each of the resulting numerical vectors to Mod Mod 26 Mod Mod 26 0 Mod Mod
13 4. Use Table II to convert each of the values in the resulting vectors back to letters. 1 S 7 25 H Z 24 0 Y A 19 6 T G Z T 5. The encrypted message now reads SHZYATGZT. 4.3 Decryption The process to decrypt the phrase SHZYATGZT similar to encryption, except we need to use the modular inverse of the original encryption matrix, which is
14 1. Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. S 1 H Z 7 25 Y A 24 0 T G 19 6 Z T Multiply each of the numerical vectors by the decryption matrix,
15 3. Convert each of the resulting numerical vectors to Mod Mod 26 4 Mod 26 Mod 26 Mod Mod Use Table II to convert each of the values in the resulting vectors back to letters. 7 H 4 E O W O R 3 D 5. The decrypted message is now HEOWORD which can easily be deciphered as HEO WORD. 15
16 5 Hill-3 Ciphers 5.1 Choosing Matrices A Hill-3 Cipher uses a 3 3 invertible matrix A to encrypt data and another 3 x 3 invertible matrix B to decrypt data. You might choose a matrix A If you calculate the det A you get: det det det (6 + 1) (-9-2) (3-4) det A Mod 26 0 If you look at Table III, there is no entry for 0, so there is no modular inverse. Because of this, matrix A won't work. While you could certainly encrypt messages with matrix A, there would be no way to decrypt them. If you modify matrix A to det det det , here is the determinant: 1 (6 + 1) (-4-3) (2-9) det A Mod
17 If you look at Table III, you can see that the modular inverse of 9 3. To calculate B you need to multiply the adjucate of A (adj A) by the modular inverse of det A for Mod m and then calculate Mod m for the entries in the resulting matrix. To calculate adj A: 3 1 C + det C 21 - det C 31 + det C 12 - det C 22 + det C 32 - det C 13 + det C 23 - det C 33 + det 2 3 C (6 - (-1)) 7 C 12 -(-4-3) 7 C 13 (2-9) -7 C 21 -(4-2) -2 C 22 (2 - (-6)) C 23 -(-1-6) 7 C 31 (2 - (-6)) C 32 -(1-4) 3 C 33 (3 - (-4)) 7 You can take the results and put them into a new matrix C and now adj A C T. adj A Now you can calculate the modular inverse of A: B B Mod Therefore is the modular inverse of Mod encrypted using for is the matrix you would use to decrypt a Hill cipher 17
18 To check that is the modular inverse of : Mod I Encryption Here is how to encrypt thephrase HEO WORD using a Hill-3 Cipher The encryption matrix A and the decryption matrix B
19 1. Divide the phrase to encrypt into 3 1 vectors and assign them numbers using Table II. H E 7 4 O W O R D X X You will notice that there are not enough letters to completely ll out the last vector. One common solution is to just repeat the nal letter to ll out the nal vector. Another solution, the one used here, is to ll out the nal vector with uncommonly used letters, such as X. 2. Multiply each of the numerical vectors by the encryption matrix,
20 3. Convert each of the resulting numerical vectors to Mod Mod Mod Mod 26 Mod Use Table II to convert each of the values in the resulting vectors back to letters T J N V Q A I V The encrypted message now reads TJNVQAIVDIG. D I G 20
21 5.3 Decryption The process to decrypt the phrase TJNVQAIVDIG similar to encryption, except we need to use the modular inverse of the original encryption matrix, which is Divide the phrase to encrypt into 2 1 vectors and assign them numbers using Table II. T J N V Q A I V 0 21 D I G
22 2. Multiply each of the numerical vectors by the decryption matrix, Convert each of the resulting numerical vectors to Mod Mod Mod Mod 26 Mod
23 4. Use Table II to convert each of the values in the resulting vectors back to letters. 7 4 H E O W The decrypted message is now HEOWORDXX which can easily be deciphered as HEO WORD. O R D X X 6 Conclusion The most dicult part of creating Hill ciphers is determining the encryption and decryption matrices. Once you have a viable encryption matrix and its corresponding decryption matrix, it is relatively easy to encrypt and decrypt messages, if you have a working knowledge of matrix arithmetic and how modulus works. 23
24 7 References ester S. Hill, Cryptography in an Algebraic Alphabet, The American Mathematical Monthly Vol. 36, June-July 1929, pp ester S. Hill, Concerning Certain inear Transformation Apparatus of Cryptography, The American Mathematical Monthly Vol. 3, 1931, pp Howard Anton, Chris Rorres, Elementary inear Algebra with Applications, John Wiley and Sons, Inc., New York, NY, pp David C. ay, inear Algebra and Its Applications, Pearson, Addison Wesley, Boston, Massachusetts, pp 121, 17,
Introduction to Hill cipher
Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher
More informationHill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
More informationSolutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
More informationK80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013
Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational
More informationHill Ciphers and Modular Linear Algebra
Hill Ciphers and Modular Linear Algebra Murray Eisenberg November 3, 1999 Hill ciphers are an application of linear algebra to cryptology (the science of making and breaking codes and ciphers). Below we
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +
More information8 Square matrices continued: Determinants
8 Square matrices continued: Determinants 8. Introduction Determinants give us important information about square matrices, and, as we ll soon see, are essential for the computation of eigenvalues. You
More informationNumber Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
More informationRSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
More informationLecture 2 Matrix Operations
Lecture 2 Matrix Operations transpose, sum & difference, scalar multiplication matrix multiplication, matrix-vector product matrix inverse 2 1 Matrix transpose transpose of m n matrix A, denoted A T or
More informationMatrices 2. Solving Square Systems of Linear Equations; Inverse Matrices
Matrices 2. Solving Square Systems of Linear Equations; Inverse Matrices Solving square systems of linear equations; inverse matrices. Linear algebra is essentially about solving systems of linear equations,
More informationSolving Systems of Linear Equations Using Matrices
Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.
More informationLinear Algebra Notes for Marsden and Tromba Vector Calculus
Linear Algebra Notes for Marsden and Tromba Vector Calculus n-dimensional Euclidean Space and Matrices Definition of n space As was learned in Math b, a point in Euclidean three space can be thought of
More informationCryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
More informationDecember 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
More informationName: Section Registered In:
Name: Section Registered In: Math 125 Exam 3 Version 1 April 24, 2006 60 total points possible 1. (5pts) Use Cramer s Rule to solve 3x + 4y = 30 x 2y = 8. Be sure to show enough detail that shows you are
More informationNotes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
More informationLinearly Independent Sets and Linearly Dependent Sets
These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation
More informationSolving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
More informationQuestion 2: How do you solve a matrix equation using the matrix inverse?
Question : How do you solve a matrix equation using the matrix inverse? In the previous question, we wrote systems of equations as a matrix equation AX B. In this format, the matrix A contains the coefficients
More information8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
More informationSolving simultaneous equations using the inverse matrix
Solving simultaneous equations using the inverse matrix 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix
More information1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
More informationSYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison
SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections
More informationMATHEMATICS FOR ENGINEERS BASIC MATRIX THEORY TUTORIAL 2
MATHEMATICS FO ENGINEES BASIC MATIX THEOY TUTOIAL This is the second of two tutorials on matrix theory. On completion you should be able to do the following. Explain the general method for solving simultaneous
More informationMath 115A HW4 Solutions University of California, Los Angeles. 5 2i 6 + 4i. (5 2i)7i (6 + 4i)( 3 + i) = 35i + 14 ( 22 6i) = 36 + 41i.
Math 5A HW4 Solutions September 5, 202 University of California, Los Angeles Problem 4..3b Calculate the determinant, 5 2i 6 + 4i 3 + i 7i Solution: The textbook s instructions give us, (5 2i)7i (6 + 4i)(
More informationLecture 1: Systems of Linear Equations
MTH Elementary Matrix Algebra Professor Chao Huang Department of Mathematics and Statistics Wright State University Lecture 1 Systems of Linear Equations ² Systems of two linear equations with two variables
More information= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationMATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column
More informationHFCC Math Lab Beginning Algebra 13 TRANSLATING ENGLISH INTO ALGEBRA: WORDS, PHRASE, SENTENCES
HFCC Math Lab Beginning Algebra 1 TRANSLATING ENGLISH INTO ALGEBRA: WORDS, PHRASE, SENTENCES Before being able to solve word problems in algebra, you must be able to change words, phrases, and sentences
More informationMATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS
MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS Class Meetings: MW 2:00-3:15 pm in Physics 144, September 7 to December 14 [Thanksgiving break November 23 27; final exam December 21] Instructor:
More informationTypical Linear Equation Set and Corresponding Matrices
EWE: Engineering With Excel Larsen Page 1 4. Matrix Operations in Excel. Matrix Manipulations: Vectors, Matrices, and Arrays. How Excel Handles Matrix Math. Basic Matrix Operations. Solving Systems of
More informationa 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
More informationSome practice problems for midterm 2
Some practice problems for midterm 2 Kiumars Kaveh November 15, 2011 Problem: What is the remainder of 6 2000 when divided by 11? Solution: This is a long-winded way of asking for the value of 6 2000 mod
More informationUsing row reduction to calculate the inverse and the determinant of a square matrix
Using row reduction to calculate the inverse and the determinant of a square matrix Notes for MATH 0290 Honors by Prof. Anna Vainchtein 1 Inverse of a square matrix An n n square matrix A is called invertible
More informationClock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system
CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical
More informationThe Characteristic Polynomial
Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem
More informationFactorizations: Searching for Factor Strings
" 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write
More informationECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
More informationSequences. A sequence is a list of numbers, or a pattern, which obeys a rule.
Sequences A sequence is a list of numbers, or a pattern, which obeys a rule. Each number in a sequence is called a term. ie the fourth term of the sequence 2, 4, 6, 8, 10, 12... is 8, because it is the
More informationLinear Algebra Notes
Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note
More informationCONTENTS. Please note:
CONTENTS Introduction...iv. Number Systems... 2. Algebraic Expressions.... Factorising...24 4. Solving Linear Equations...8. Solving Quadratic Equations...0 6. Simultaneous Equations.... Long Division
More information2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system
1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables
More information8.2. Solution by Inverse Matrix Method. Introduction. Prerequisites. Learning Outcomes
Solution by Inverse Matrix Method 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix algebra allows us
More informationProperties of Real Numbers
16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should
More informationSolution to Exercise 2.2. Both m and n are divisible by d, som = dk and n = dk. Thus m ± n = dk ± dk = d(k ± k ),som + n and m n are divisible by d.
[Chap. ] Pythagorean Triples 6 (b) The table suggests that in every primitive Pythagorean triple, exactly one of a, b,orc is a multiple of 5. To verify this, we use the Pythagorean Triples Theorem to write
More information1.2 Solving a System of Linear Equations
1.. SOLVING A SYSTEM OF LINEAR EQUATIONS 1. Solving a System of Linear Equations 1..1 Simple Systems - Basic De nitions As noticed above, the general form of a linear system of m equations in n variables
More informationV55.0106 Quantitative Reasoning: Computers, Number Theory and Cryptography
V55.0106 Quantitative Reasoning: Computers, Number Theory and Cryptography 3 Congruence Congruences are an important and useful tool for the study of divisibility. As we shall see, they are also critical
More informationIntroduction To Security and Privacy Einführung in die IT-Sicherheit I
Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/
More informationDirect Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations.
Section 1 Mathematics has a language all its own. In order to be able to solve many types of word problems, we need to be able to translate the English Language into Math Language. is the process of translating
More informationFAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people
More informationOperation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
More informationPart 1 Expressions, Equations, and Inequalities: Simplifying and Solving
Section 7 Algebraic Manipulations and Solving Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving Before launching into the mathematics, let s take a moment to talk about the words
More informationUnit 18 Determinants
Unit 18 Determinants Every square matrix has a number associated with it, called its determinant. In this section, we determine how to calculate this number, and also look at some of the properties of
More informationWe can express this in decimal notation (in contrast to the underline notation we have been using) as follows: 9081 + 900b + 90c = 9001 + 100c + 10b
In this session, we ll learn how to solve problems related to place value. This is one of the fundamental concepts in arithmetic, something every elementary and middle school mathematics teacher should
More informationAn Introduction to the RSA Encryption Method
April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems
More informationComputing exponents modulo a number: Repeated squaring
Computing exponents modulo a number: Repeated squaring How do you compute (1415) 13 mod 2537 = 2182 using just a calculator? Or how do you check that 2 340 mod 341 = 1? You can do this using the method
More informationSolution to Homework 2
Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if
More informationTHE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
More informationChapter 3. if 2 a i then location: = i. Page 40
Chapter 3 1. Describe an algorithm that takes a list of n integers a 1,a 2,,a n and finds the number of integers each greater than five in the list. Ans: procedure greaterthanfive(a 1,,a n : integers)
More informationMatrix Algebra. Some Basic Matrix Laws. Before reading the text or the following notes glance at the following list of basic matrix algebra laws.
Matrix Algebra A. Doerr Before reading the text or the following notes glance at the following list of basic matrix algebra laws. Some Basic Matrix Laws Assume the orders of the matrices are such that
More informationGrade 6 Math Circles. Binary and Beyond
Faculty of Mathematics Waterloo, Ontario N2L 3G1 The Decimal System Grade 6 Math Circles October 15/16, 2013 Binary and Beyond The cool reality is that we learn to count in only one of many possible number
More informationMath Review. for the Quantitative Reasoning Measure of the GRE revised General Test
Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
More informationAbstract: We describe the beautiful LU factorization of a square matrix (or how to write Gaussian elimination in terms of matrix multiplication).
MAT 2 (Badger, Spring 202) LU Factorization Selected Notes September 2, 202 Abstract: We describe the beautiful LU factorization of a square matrix (or how to write Gaussian elimination in terms of matrix
More informationAbstract Algebra Cheat Sheet
Abstract Algebra Cheat Sheet 16 December 2002 By Brendan Kidwell, based on Dr. Ward Heilman s notes for his Abstract Algebra class. Notes: Where applicable, page numbers are listed in parentheses at the
More informationHere are some examples of combining elements and the operations used:
MATRIX OPERATIONS Summary of article: What is an operation? Addition of two matrices. Multiplication of a Matrix by a scalar. Subtraction of two matrices: two ways to do it. Combinations of Addition, Subtraction,
More informationUniversity of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
More informationNetwork Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More information1 Determinants and the Solvability of Linear Systems
1 Determinants and the Solvability of Linear Systems In the last section we learned how to use Gaussian elimination to solve linear systems of n equations in n unknowns The section completely side-stepped
More information26. Determinants I. 1. Prehistory
26. Determinants I 26.1 Prehistory 26.2 Definitions 26.3 Uniqueness and other properties 26.4 Existence Both as a careful review of a more pedestrian viewpoint, and as a transition to a coordinate-independent
More informationSolving Systems of Linear Equations
LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how
More informationFactoring Algorithms
Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors
More informationIntroduction to Matrix Algebra
Psychology 7291: Multivariate Statistics (Carey) 8/27/98 Matrix Algebra - 1 Introduction to Matrix Algebra Definitions: A matrix is a collection of numbers ordered by rows and columns. It is customary
More informationMAT 200, Midterm Exam Solution. a. (5 points) Compute the determinant of the matrix A =
MAT 200, Midterm Exam Solution. (0 points total) a. (5 points) Compute the determinant of the matrix 2 2 0 A = 0 3 0 3 0 Answer: det A = 3. The most efficient way is to develop the determinant along the
More informationMathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information
The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet
More informationCopy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.
Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}
More informationNo Solution Equations Let s look at the following equation: 2 +3=2 +7
5.4 Solving Equations with Infinite or No Solutions So far we have looked at equations where there is exactly one solution. It is possible to have more than solution in other types of equations that are
More informationPYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
More information15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
More informationLinear Equations in One Variable
Linear Equations in One Variable MATH 101 College Algebra J. Robert Buchanan Department of Mathematics Summer 2012 Objectives In this section we will learn how to: Recognize and combine like terms. Solve
More informationGrade 7/8 Math Circles Fall 2012 Factors and Primes
1 University of Waterloo Faculty of Mathematics Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Fall 2012 Factors and Primes Factors Definition: A factor of a number is a whole
More information[1] Diagonal factorization
8.03 LA.6: Diagonalization and Orthogonal Matrices [ Diagonal factorization [2 Solving systems of first order differential equations [3 Symmetric and Orthonormal Matrices [ Diagonal factorization Recall:
More informationThe application of prime numbers to RSA encryption
The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered
More informationArkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan
Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 3 Binary Operations We are used to addition and multiplication of real numbers. These operations combine two real numbers
More informationTechniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
More informationContent. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11
Content Credits 11 Chapter 1 Arithmetic Refresher 13 1.1 Algebra 14 Real Numbers 14 Real Polynomials 19 1.2 Equations in one variable 21 Linear Equations 21 Quadratic Equations 22 1.3 Exercises 28 Chapter
More informationUse of Linear Algebra in Cryptography
Use of Linear Algebra in Cryptography Hong-Jian Lai Department of Mathematics West Virginia University Morgantown, WV p. 1/?? Creating a Matrix Problem: To create a matrix A = 1 2 3 4 5 6 7 8 10. p. 2/??
More informationCHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
More informationCaesar Ciphers: An Introduction to Cryptography
Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationSession 6 Number Theory
Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple
More informationMath 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
More information160 CHAPTER 4. VECTOR SPACES
160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results
More informationPOLYNOMIAL FUNCTIONS
POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationLinear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
More information