Use of Linear Algebra in Cryptography



Similar documents
Introduction to Hill cipher

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Hill s Cipher: Linear Algebra in Cryptography

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Solutions to Problem Set 1

An Introduction to Hill Ciphers Using Linear Algebra

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Chapter 3. if 2 a i then location: = i. Page 40

Students will operate in pairs and teams of four to decipher and encipher information.

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

Basic Algorithms In Computer Algebra

Groups in Cryptography

Page 1. Session Overview: Cryptography

Here are some examples of combining elements and the operations used:

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

V Quantitative Reasoning: Computers, Number Theory and Cryptography

Free Pre-Algebra Lesson 55! page 1

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

MOVIES, GAMBLING, SECRET CODES, JUST MATRIX MAGIC

2.3. Finding polynomial functions. An Introduction:

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Chapter 2 Homework 2-5, 7, 9-11, 13-18, 24. (9x + 2)(mod 26) y 1 1 (x 2)(mod 26) 3(x 2)(mod 26) U : y 1 = 3(20 2)(mod 26) 54(mod 26) 2(mod 26) c

Factoring Algorithms

Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

Negative Integer Exponents

5 Systems of Equations

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Computing exponents modulo a number: Repeated squaring

Cryptography and Network Security Chapter 8

RSA and Primality Testing

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Alum Rock Elementary Union School District Algebra I Study Guide for Benchmark III

BookTOC.txt. 1. Functions, Graphs, and Models. Algebra Toolbox. Sets. The Real Numbers. Inequalities and Intervals on the Real Number Line

Hill Ciphers and Modular Linear Algebra

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security: Cryptography CS/SS G513 S.K. Sahay

A software solution is needed for secure communication between you and a friend. Requirements

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

CSCE 465 Computer & Network Security

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

The Advanced Encryption Standard (AES)

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

An Introduction to RSA Public-Key Cryptography

RSA Encryption. Tom Davis October 10, 2003

Discrete Mathematics: Homework 7 solution. Due:

Rijndael Encryption implementation on different platforms, with emphasis on performance

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

mod 10 = mod 10 = 49 mod 10 = 9.

Lecture 13: Factoring Integers

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Network Security. HIT Shimrit Tzur-David

Number Theory and Cryptography using PARI/GP

Homomorphic Encryption Method Applied to Cloud Computing

Factoring Algorithms

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

CS 173, Spring 2015 Examlet 2, Part A

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

by the matrix A results in a vector which is a reflection of the given

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

8 Primes and Modular Arithmetic

8-6 Radical Expressions and Rational Exponents. Warm Up Lesson Presentation Lesson Quiz

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Public Key Cryptography: RSA and Lots of Number Theory

Math Common Core Sampler Test

A Factoring and Discrete Logarithm based Cryptosystem

Intermediate Math Circles March 7, 2012 Linear Diophantine Equations II

Matrices 2. Solving Square Systems of Linear Equations; Inverse Matrices

Factoring Polynomials

MTH124: Honors Algebra I

CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Study of algorithms for factoring integers and computing discrete logarithms

MBA Jump Start Program

Introduction to Cryptography CS 355

Cryptography Exercises

Algebra 1 Advanced Mrs. Crocker. Final Exam Review Spring 2014

Cryptography and Network Security Chapter 9

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

SFWR ENG 4C03 - Computer Networks & Computer Security

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Sequences. A sequence is a list of numbers, or a pattern, which obeys a rule.

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Modélisation et résolutions numérique et symbolique

2.3 Solving Equations Containing Fractions and Decimals

Computer Security: Principles and Practice

Algebra I Vocabulary Cards

Public Key Cryptography of Digital Signatures

Essential Mathematics for Computer Graphics fast

The Factor Theorem and a corollary of the Fundamental Theorem of Algebra

The Mathematics of the RSA Public-Key Cryptosystem

Split Based Encryption in Secure File Transfer

CS 758: Cryptography / Network Security

Transcription:

Use of Linear Algebra in Cryptography Hong-Jian Lai Department of Mathematics West Virginia University Morgantown, WV p. 1/??

Creating a Matrix Problem: To create a matrix A = 1 2 3 4 5 6 7 8 10. p. 2/??

Creating a Matrix Problem: To create a matrix A = 1 2 3 4 5 6 7 8 10. Matlab: p. 2/??

Creating a Matrix Problem: To create a matrix A = 1 2 3 4 5 6 7 8 10. Matlab: A = [1 2 3;4 5 6;7 8 10] p. 2/??

Compute the inverse of A mod m Output setting: Need to set the output as "rational" using a matlab comment format rat; p. 3/??

Compute the inverse of A mod m Output setting: Need to set the output as "rational" using a matlab comment format rat; 1 2 3 Problem: Given A = 4 5 6, find A 1 mod 26. 7 8 10 p. 3/??

Step 1: Compute inverse over the reals Matlab commends: p. 4/??

Step 1: Compute inverse over the reals Matlab commends: format rat; p. 4/??

Step 1: Compute inverse over the reals Matlab commends: format rat; Ainv = inv(a) p. 4/??

Step 1: Compute inverse over the reals Matlab commends: format rat; Ainv = inv(a) 2/3 4/3 1 Ainv = 2/3 11/3 2 1 2 1 p. 4/??

Step 1: Compute inverse over the reals Matlab commends: format rat; Ainv = inv(a) 2/3 4/3 1 Ainv = 2/3 11/3 2 1 2 1 Observation: 3 is a common denominator. p. 4/??

Step 2: Making it all integral Problem: Need to rationalize this matrix before we take modulo m. As every entry of Ainv has a common denominator 3, multiply by 3 to make it an integer valued matrix. p. 5/??

Step 2: Making it all integral Problem: Need to rationalize this matrix before we take modulo m. As every entry of Ainv has a common denominator 3, multiply by 3 to make it an integer valued matrix. A1=(Ainv*3) p. 5/??

Step 2: Making it all integral Problem: Need to rationalize this matrix before we take modulo m. As every entry of Ainv has a common denominator 3, multiply by 3 to make it an integer valued matrix. A1=(Ainv*3) 2 4 3 A1 = 2 11 6 3 6 3 p. 5/??

Step 3: Find the inverse of A (mod 26) Problem: In Step 2, we computed A1 = 3A 1 (mod 26). We need to multiply A1 by 3 1 to get A 1. p. 6/??

Step 3: Find the inverse of A (mod 26) Problem: In Step 2, we computed A1 = 3A 1 (mod 26). We need to multiply A1 by 3 1 to get A 1. Compute 3 1 9 (mod 26). p. 6/??

Step 3: Find the inverse of A (mod 26) Problem: In Step 2, we computed A1 = 3A 1 (mod 26). We need to multiply A1 by 3 1 to get A 1. Compute 3 1 9 (mod 26). Use matlab commend: M2 = round(mod(m1 9,26)) to find A 1 = A2 p. 6/??

Step 3: Find the inverse of A (mod 26) Problem: In Step 2, we computed A1 = 3A 1 (mod 26). We need to multiply A1 by 3 1 to get A 1. Compute 3 1 9 (mod 26). Use matlab commend: M2 = round(mod(m1 9,26)) to find A 1 = A2 8 16 1 A 1 := A2 = 8 21 24 1 24 1 p. 6/??

Example 1: The problem Problem Suppose that we have intercepted a cipher text HVSCSCBKRYMIUA, and intelligent agents informed us that this is encrypted by a block cipher using digraphs (size 2 blocks) with a mod 26 alphabet, and that the plain text of THRY has been encrypted as HVRY. Break this code by finding the plain text. p. 7/??

Example 1: Compute deciphering matrix, Step 1 Solution strategy: Compute the decoding matrix A 1 = P 1 C 1 1, where P 1 is given by plain text THRY and C 1 is by cipher text HVRY. p. 8/??

Example 1: Compute deciphering matrix, Step 1 Solution strategy: Compute the decoding matrix A 1 = P 1 C 1 1, where P 1 is given by plain text THRY and C 1 is by cipher text HVRY. format rat; C1 = [7 17;21 24],C3 = inv(c1) p. 8/??

Example 1: Compute deciphering matrix, Step 1 Solution strategy: Compute the decoding matrix A 1 = P 1 C 1 1, where P 1 is given by plain text THRY and C 1 is by cipher text HVRY. format rat; C1 = [7 17;21 24],C3 = inv(c1) 8/63 17/189 C3 = 1/9 1/27 p. 8/??

Example 1: Compute deciphering matrix, Step 1 Solution strategy: Compute the decoding matrix A 1 = P 1 C 1 1, where P 1 is given by plain text THRY and C 1 is by cipher text HVRY. format rat; C1 = [7 17;21 24],C3 = inv(c1) 8/63 17/189 C3 = 1/9 1/27 Observation: 189 is a common denominator. p. 8/??

Example 1: Compute deciphering matrix, Step 2 Compute 189 1 15 (mod 26) (using powermod or gcd). p. 9/??

Example 1: Compute deciphering matrix, Step 2 Compute 189 1 15 (mod 26) (using powermod or gcd). C4 = C3 189;C5 = round(mod(c4 15,26)) p. 9/??

Example 1: Compute deciphering matrix, Step 2 Compute 189 1 15 (mod 26) (using powermod or gcd). C4 = C3 189;C5 = round(mod(c4 15,26)) C5 = 4 21 3 25 p. 9/??

Example 1: Compute deciphering matrix Ainv, Step 3 Strategy review: A 1 = P 1 C 1 1, and C5 = C 1 1. p. 10/??

Example 1: Compute deciphering matrix Ainv, Step 3 Strategy review: A 1 = P 1 C 1 1, and C5 = C 1 1. P1 = [19 17;7 24];Ainv = mod(p1 C5,26) p. 10/??

Example 1: Compute deciphering matrix Ainv, Step 3 Strategy review: A 1 = P 1 C 1 1, and C5 = C 1 1. P1 = [19 17;7 24];Ainv = mod(p1 C5,26) 23 18 Ainv = 22 19 p. 10/??

Example 1: Compute deciphering matrix Ainv, Step 3 Strategy review: A 1 = P 1 C 1 1, and C5 = C 1 1. P1 = [19 17;7 24];Ainv = mod(p1 C5,26) 23 18 Ainv = 22 19 p. 10/??

Example 1: Decoding Decoding computation: P = A 1 C p. 11/??

Example 1: Decoding Decoding computation: P = A 1 C C = [7 18 18 1 17 12 20;21 2 2 10 24 8 0];P = mod(ainv C,26) p. 11/??

Example 1: Decoding Decoding computation: P = A 1 C C = [7 18 18 1 17 12 20;21 2 2 10 24 8 0];P = mod(ainv C,26) 19 8 8 21 17 4 18 P = 7 18 18 4 24 0 24 p. 11/??

Example 1: Decoding Decoding computation: P = A 1 C C = [7 18 18 1 17 12 20;21 2 2 10 24 8 0];P = mod(ainv C,26) 19 8 8 21 17 4 18 P = 7 18 18 4 24 0 24 Back to English: the message is THISISVERYEASY. p. 11/??