SlideShare a Scribd company logo
1 of 2
Download to read offline
APPLICATIONS OF MATRICES
Cryptography
Cryptography involves encrypting data so that a third party can not intercept and read the data.
In the early days of satellite television, the video signals weren't encrypted and anyone with a
satellite dish could watch whatever was being shown. Well, this didn't work because all of the
networks using satellites didn't want the satellite dish owners to be able to receive their satellite
feed for no cost while cable subscribers had to pay for the channel, they were losing money. So,
they started encrypting the video signal with a system called Videocipher (later replaced by
Videocipher II).
What the Videocipher encryption system did was to convert the signal into digital form, encrypt
it, and send the data over the satellite. If the satellite dish owner had a Videocipher box, and paid
for the channel, then the box would descramble (unencrypt) the signal and return it to its original,
useful form.
This was done by using a key that was invertible. It was very important that they key be
invertible, or there would be no way to return the encrypted data to its original form.
The same thing can be done using matrices.
Encryption Process
Decryption Process
Solution
APPLICATIONS OF MATRICES
Cryptography
Cryptography involves encrypting data so that a third party can not intercept and read the data.
In the early days of satellite television, the video signals weren't encrypted and anyone with a
satellite dish could watch whatever was being shown. Well, this didn't work because all of the
networks using satellites didn't want the satellite dish owners to be able to receive their satellite
feed for no cost while cable subscribers had to pay for the channel, they were losing money. So,
they started encrypting the video signal with a system called Videocipher (later replaced by
Videocipher II).
What the Videocipher encryption system did was to convert the signal into digital form, encrypt
it, and send the data over the satellite. If the satellite dish owner had a Videocipher box, and paid
for the channel, then the box would descramble (unencrypt) the signal and return it to its original,
useful form.
This was done by using a key that was invertible. It was very important that they key be
invertible, or there would be no way to return the encrypted data to its original form.
The same thing can be done using matrices.
Encryption Process
Decryption Process

More Related Content

Similar to APPLICATIONS OF MATRICESCryptographyCryptography involves encryp.pdf

0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
authority12
 
Steven_Cheuk_Final_Report
Steven_Cheuk_Final_ReportSteven_Cheuk_Final_Report
Steven_Cheuk_Final_Report
Steven Moran
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
Soon Zoo Kwon
 
Television digital terrestre version inlges
Television digital terrestre version inlgesTelevision digital terrestre version inlges
Television digital terrestre version inlges
edsacun
 

Similar to APPLICATIONS OF MATRICESCryptographyCryptography involves encryp.pdf (20)

0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Surveillance camera control system
Surveillance camera control systemSurveillance camera control system
Surveillance camera control system
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steven_Cheuk_Final_Report
Steven_Cheuk_Final_ReportSteven_Cheuk_Final_Report
Steven_Cheuk_Final_Report
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV Cameras
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Television digital terrestre version inlges
Television digital terrestre version inlgesTelevision digital terrestre version inlges
Television digital terrestre version inlges
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 

More from anokhijew

Liquid crystals (LCs) are a state of matter that .pdf
                     Liquid crystals (LCs) are a state of matter that .pdf                     Liquid crystals (LCs) are a state of matter that .pdf
Liquid crystals (LCs) are a state of matter that .pdf
anokhijew
 
The Data recovery is of two types …One method is by using a softwa.pdf
The Data recovery is of two types …One method is by using a softwa.pdfThe Data recovery is of two types …One method is by using a softwa.pdf
The Data recovery is of two types …One method is by using a softwa.pdf
anokhijew
 
StudentData.javaimport java.util.Scanner; public class Student.pdf
StudentData.javaimport java.util.Scanner; public class Student.pdfStudentData.javaimport java.util.Scanner; public class Student.pdf
StudentData.javaimport java.util.Scanner; public class Student.pdf
anokhijew
 
Reverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdfReverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdf
anokhijew
 
Quantum mechanics predicts the existence of what are usually called .pdf
Quantum mechanics predicts the existence of what are usually called .pdfQuantum mechanics predicts the existence of what are usually called .pdf
Quantum mechanics predicts the existence of what are usually called .pdf
anokhijew
 
Program Educational Objectives • To create competencies and opportun.pdf
Program Educational Objectives • To create competencies and opportun.pdfProgram Educational Objectives • To create competencies and opportun.pdf
Program Educational Objectives • To create competencies and opportun.pdf
anokhijew
 

More from anokhijew (20)

we know that there is an OH group present in phen.pdf
                     we know that there is an OH group present in phen.pdf                     we know that there is an OH group present in phen.pdf
we know that there is an OH group present in phen.pdf
 
systems T and P are different from the reservoi.pdf
                     systems T and P are different from the reservoi.pdf                     systems T and P are different from the reservoi.pdf
systems T and P are different from the reservoi.pdf
 
Since X represents the solid phase, Y represents .pdf
                     Since X represents the solid phase, Y represents .pdf                     Since X represents the solid phase, Y represents .pdf
Since X represents the solid phase, Y represents .pdf
 
Pb^2+ may be present. .pdf
                     Pb^2+ may be present.                            .pdf                     Pb^2+ may be present.                            .pdf
Pb^2+ may be present. .pdf
 
P inversly proportional to 1V so answer is C .pdf
                     P inversly proportional to 1V so answer is C    .pdf                     P inversly proportional to 1V so answer is C    .pdf
P inversly proportional to 1V so answer is C .pdf
 
nutrinos are the smallest part of an atom. NOTE-.pdf
                     nutrinos are the smallest part of an atom. NOTE-.pdf                     nutrinos are the smallest part of an atom. NOTE-.pdf
nutrinos are the smallest part of an atom. NOTE-.pdf
 
Molecular solids are held together in single chai.pdf
                     Molecular solids are held together in single chai.pdf                     Molecular solids are held together in single chai.pdf
Molecular solids are held together in single chai.pdf
 
Liquid crystals (LCs) are a state of matter that .pdf
                     Liquid crystals (LCs) are a state of matter that .pdf                     Liquid crystals (LCs) are a state of matter that .pdf
Liquid crystals (LCs) are a state of matter that .pdf
 
interstellar medium (gas) Solution .pdf
                     interstellar medium (gas) Solution           .pdf                     interstellar medium (gas) Solution           .pdf
interstellar medium (gas) Solution .pdf
 
Hhyd = Hcrystallization + Hsolv Enthalpy of Solv.pdf
                     Hhyd = Hcrystallization + Hsolv  Enthalpy of Solv.pdf                     Hhyd = Hcrystallization + Hsolv  Enthalpy of Solv.pdf
Hhyd = Hcrystallization + Hsolv Enthalpy of Solv.pdf
 
The answer is (b) the condensation of steam to liiquid water.The e.pdf
The answer is (b) the condensation of steam to liiquid water.The e.pdfThe answer is (b) the condensation of steam to liiquid water.The e.pdf
The answer is (b) the condensation of steam to liiquid water.The e.pdf
 
XML Extensiable Markup LanguageHTML Hypertext Markup LanguageD.pdf
XML Extensiable Markup LanguageHTML Hypertext Markup LanguageD.pdfXML Extensiable Markup LanguageHTML Hypertext Markup LanguageD.pdf
XML Extensiable Markup LanguageHTML Hypertext Markup LanguageD.pdf
 
The Data recovery is of two types …One method is by using a softwa.pdf
The Data recovery is of two types …One method is by using a softwa.pdfThe Data recovery is of two types …One method is by using a softwa.pdf
The Data recovery is of two types …One method is by using a softwa.pdf
 
Thanks anon101. D is correctSolutionThanks anon101. D is corre.pdf
Thanks anon101. D is correctSolutionThanks anon101. D is corre.pdfThanks anon101. D is correctSolutionThanks anon101. D is corre.pdf
Thanks anon101. D is correctSolutionThanks anon101. D is corre.pdf
 
StudentData.javaimport java.util.Scanner; public class Student.pdf
StudentData.javaimport java.util.Scanner; public class Student.pdfStudentData.javaimport java.util.Scanner; public class Student.pdf
StudentData.javaimport java.util.Scanner; public class Student.pdf
 
Reverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdfReverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdf
 
Quantum mechanics predicts the existence of what are usually called .pdf
Quantum mechanics predicts the existence of what are usually called .pdfQuantum mechanics predicts the existence of what are usually called .pdf
Quantum mechanics predicts the existence of what are usually called .pdf
 
Program Educational Objectives • To create competencies and opportun.pdf
Program Educational Objectives • To create competencies and opportun.pdfProgram Educational Objectives • To create competencies and opportun.pdf
Program Educational Objectives • To create competencies and opportun.pdf
 
P2O5 removes H2O from Alcohol to form Alkene O of Alcohol gives it.pdf
P2O5 removes H2O from Alcohol to form Alkene O of Alcohol gives it.pdfP2O5 removes H2O from Alcohol to form Alkene O of Alcohol gives it.pdf
P2O5 removes H2O from Alcohol to form Alkene O of Alcohol gives it.pdf
 
cant understand a thing .pdf
                     cant understand a thing                          .pdf                     cant understand a thing                          .pdf
cant understand a thing .pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

APPLICATIONS OF MATRICESCryptographyCryptography involves encryp.pdf

  • 1. APPLICATIONS OF MATRICES Cryptography Cryptography involves encrypting data so that a third party can not intercept and read the data. In the early days of satellite television, the video signals weren't encrypted and anyone with a satellite dish could watch whatever was being shown. Well, this didn't work because all of the networks using satellites didn't want the satellite dish owners to be able to receive their satellite feed for no cost while cable subscribers had to pay for the channel, they were losing money. So, they started encrypting the video signal with a system called Videocipher (later replaced by Videocipher II). What the Videocipher encryption system did was to convert the signal into digital form, encrypt it, and send the data over the satellite. If the satellite dish owner had a Videocipher box, and paid for the channel, then the box would descramble (unencrypt) the signal and return it to its original, useful form. This was done by using a key that was invertible. It was very important that they key be invertible, or there would be no way to return the encrypted data to its original form. The same thing can be done using matrices. Encryption Process Decryption Process Solution APPLICATIONS OF MATRICES Cryptography Cryptography involves encrypting data so that a third party can not intercept and read the data. In the early days of satellite television, the video signals weren't encrypted and anyone with a satellite dish could watch whatever was being shown. Well, this didn't work because all of the networks using satellites didn't want the satellite dish owners to be able to receive their satellite feed for no cost while cable subscribers had to pay for the channel, they were losing money. So, they started encrypting the video signal with a system called Videocipher (later replaced by Videocipher II). What the Videocipher encryption system did was to convert the signal into digital form, encrypt it, and send the data over the satellite. If the satellite dish owner had a Videocipher box, and paid for the channel, then the box would descramble (unencrypt) the signal and return it to its original, useful form. This was done by using a key that was invertible. It was very important that they key be
  • 2. invertible, or there would be no way to return the encrypted data to its original form. The same thing can be done using matrices. Encryption Process Decryption Process