SlideShare a Scribd company logo
1 of 7
Download to read offline
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 111|P a g e
Cryptographic Technique Used Lower and Upper Triangular
Decomposition Method
B. KumaraswamyAchary, K. Rama Krishna Prasad, V. Vasu
Department of Mathematics, S.V. University, Tirupati
Abstract:
In this paper, the main cryptographic technique we will use affine cipher used for encryption and also
decryption by using one of the linear algebra technique lower and upper triangular technique
Key words: Affine cipher, encryption, decryption, lower and upper triangular decomposition.
I. Introduction:
An encryption scheme or cryptosystem is a tuple (P, C, K, E, D) with the following properties.
 P is a set. It is called the plaintext space. Its elements are called plaintext.
 C is a set. It is called the cipher text space. Its elements are called cipher text.
 K is a set. It is called the key space. Its elements are called keys.
Factorization method:
This method is based on the fact that every matrix A can be expressed as the product of a
lower triangular matrix and an upper triangular matrix provided al the principals minors of a are
non-singular.i.e.
If A=[aij] then
11 12 13
11 12
11 21 22 23
21 22
31 32 32
0 0, 0
a a a
a a
a a a a etc
a a
a a a
  
Also such a factorization if it exists, is unique. Now consider the equations.
11 1 12 2 13 3 1
21 1 22 2 23 3 2
31 1 32 2 33 3 3
a x a x a x b
a x a x a x b
a x a x a x b
  
  
  
Which can be written as AX=B where
11 12 13 1 1
21 22 23 2 2
31 32 33 3 3
, ,
a a a x b
A a a a X x B b
a a a x b
  
Let A= LU
Where 21
31 32
1 0 0
1 0
1
L l
l l
 and
11 12 13
22 23
33
0
0 0
u u u
U u u
u

Then (1) becomes LUX=B
Writing UX=V1
(3) Becomes LV=B which is equivalent to the equations
V1=b1:l2V1+V2=b2:l31v1+l32v2+v3=b3
Solving these for V1, V2, V3 we know V1 then
(4) Becomes
U11X1+U12X2+U13X3=V11U22X2+U23X3=V21
RESEARCH ARTICLE OPEN ACCESS
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 112|P a g e
U33X3=V3
From which x3,x2 and x1 can be found by back-substitution. To compute matrices L and U, we
write (2) as
11 12 13 11 12 13
21 22 23 21 22 23
31 32 33 31 32 33
1 0 0
1 0 0
0 0 0
u u u a a a
l u u a a a
l l u a a a

Multiplying the matrices on the left and equating corresponding elements from both sides,
we obtain
i) U11=all, u12=a12, u13=a13.
ii) L21u11=a21 (or) l21=a21/a11.
L31u11=a31 (or) l31=a31/all.
iii) L21u21+u22=a22 (or) u22=a22-a21/all a12.
L21u13+u23=a23 (or) u23=a23-a21/a11a13.
iv) L31u13+l32u22=a32 (or) l32=1/u22 [a32-a31/a11 a12]
v) L31u13+l33u23=a33 (or) which gives u33.
Thus we compute the elements of L and U in the following set order.
i) First row of U.
ii) First row of L.
iii) Second row of U1
iv) Second row of L1
v) Third row of U1
This procedure can easily be generalized.
Affine cipher:
The encryption process:
In fact, we can summarizethe encryption which is the process of converting plaintext into
cipher text in the following steps.
a. Choose an (mxm) matrix A=LU which is invertible, where ‘m’ have may be depends on
the length of the message that needs to be encrypted.
b. Change each plain text to its numerical values, by using the table below.
A B C D E F G H I J K L
3 4 5 6 7 8 9 10 11 12 13 14
M N O P Q R S T U V W X
15 16 17 18 19 20 21 22 23 24 25 0
Y Z
1 2
c. Form the (mx1) column vector P, having these numerical values as its entries.
d. Get each ciphertext vector C by multiplying A=LU with P and connect each entry of the
ciphertext vector to its letter in the alphabet where L is lower triangular matrix and U is
upper triangular matrix.
The encryption algorithm of this method is C=LUP mod N.
Where C is the column vector of the numerical values of ciphertext, P is the column vector of
the numerical values of the plaintext, LU AN (mxm) matrix, is the key of the algorithm (this matrix
must be invertible because are need the inverse of this matrix for the decryption process) and N is the
number of letters of the alphabet used in the cryptography the decryption process:
The decryption which is the process of converting the cipher text into plaintext could also be
summarized in the following steps:
a. Get the inverse of the matrix LU: say (LU)-1.
b. Change each ciphertext to its numerical values.
c. Put each ciphertext in (mx1) column vector say C.
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 113|P a g e
d. Get each plaintext vector by multiplying (LU)-1 with C, and connect each plaintext vector to
its letter in the alphabet. The decryption algorithm of this method is P (LU)-1 mod N. where
(LU)-1 is the inverse of the matrix LU.
In general, if A= LU
Where
11 12 13
21 22 23
31 32 33
1 0 0
1 0 0
1 0 0
u u u
L l U u u
l l u
   
       
      
And
11
1
...
u
P
P
P
 
   
  
then in the encryption process, we get C= LUP mod N.
11 11 12 13 11
21 22 23
1 31 32 33
1 0 0
... 1 0 0 ...
1 0 0u nn
C u u u p
l u u
C l l u p
       
               
              
Here when the size of the matrix A increases, or in other words when increases we will have
the following advantages.
1. The cryptography process will be more complex and more difficult to decode.
2. The number of column vectors will decreases and we can encode any message consisting for
example of 7 letters by using A(7x7) matrix in only one step. But there is one problem here,
that is, it’s not easy to get the inverse of the matrix used in the encryption process as n
increases.
Below, we give several other ways of using affine cipher technique for encryption.
We can use the affine cipher technique to make the hill cipher more complex encryption
algorithm here is given as
C=LUP+B (mod N)
11 11 12 13 11 1
21 22 23
1 31 32 33 1
1 0 0 ...
... 1 0 0 ... ... ...
1 0 0 ....
n
n n nn
c u u u b b
l u u
c l l u b b
      
      
       
      
      
Where A=LU is an invertible matrix and B is a column vector like the vectors C and P.
For the decryption
P=LU-1C-LU-1B= LU-1(C-B) (mod N)
Example 1: Encode the message (welcome) by using affine cipher algorithm where the matrix is
4 1
2 3
A
 
  
 
Sol: First use the table below to convert letters in the message to their numerical values.
A B C D E F G H I J K L
3 4 5 6 7 8 9 10 11 12 13 14
M N O P Q R S T U V W X
15 16 17 18 19 20 21 22 23 24 25 0
Y Z
1 2
Put also number O for the space between words. Group the plaintext letters into pairs and
add O to fill out the last pairs.
W E L C O M E T O
25 7 14 5 17 15 7 0 22 17 0
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 114|P a g e
11 12 11 12
21 22 21 11 21 12 22
1 04 1
1 02 3
U U U U
A
l U l U l U U
      
                
U11=4 V12=1, L21U12+U22=3
L21U11=2 ½ 1+V22=3
L21=2/4=1/2 V22=3-1/2=5/2
1 0 4 1
,
1/ 2 0 0 5/ 2
L U
   
    
   
 mod26C LUB
 1
1 0 4 1 25 3
mod26
1/ 2 0 0 5/ 2 7 19
C
       
        
       
 2
1 0 4 1 14 9
mod26
1/ 2 0 0 5/ 2 5 17
C
       
        
       
 3
1 0 4 1 17 5
mod26
1/ 2 0 0 5/ 2 15 1
C
       
        
       
 4
1 0 4 1 7 2
mod26
1/ 2 0 0 5/ 2 0 14
C
       
        
       
 5
1 0 4 1 22 1
mod26
1/ 2 0 0 5/ 2 17 17
C
       
        
       
Now the message becomes
3 19 9 17 5 1 2 14 1 17
A W G O C Y Z L Y O
Example 2: Encoding the message (Application of Mathematics)
3 2 7
2 3 1
3 4 1
a
 
 
  
 
 
Let
11 12 13
21 22 23
31 32 33
1 0 0
1 0 0
1 0 0
u u u
A UL l u u
l l u
  
  
    
  
  
11 12 13
21 22 23
31 32 33
3 2 7 1 0 0
2 3 1 1 0 0
3 4 1 1 0 0
u u u
l u u
l l u
     
           
          
So that
(i) U11=3, U12= 2, U13=7
(ii) L21U11=2, L31U11=3, L21=2/3
L31=1
(iii) L21U12+U22=3, L21U13+U23=1
V22=5/3 U23=11/3
(iv) L31U12+L32U22=4
L32=6/5
(v) L31U13+L32U23+U33=1
U33=-8/5
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 115|P a g e
Thus
1 0 0 3 2 7
2/3 1 0 0 5/3 11/3
1 6/5 1 0 0 8/5
A LV
   
        
      
Application of Mathematics
3 18 18 14 11 3 22 11 17 16 178 15 3 22 10 7 15 3 22 11 5 2 1
C=LUP mod M
 1
1 0 0 3 2 7 3 15
2/3 1 0 0 5/3 11/3 18 0 mod26
1 6/5 1 0 0 8/5 18 21
C
       
                
              
 2
1 0 0 3 2 7 14 21
2/3 1 0 0 5/3 11/3 11 14 mod26
1 6/5 1 0 0 8/5 5 13
C
       
                
              
 3
1 0 0 3 2 7 3 0
2/3 1 0 0 5/3 11/3 22 5 mod26
1 6/5 1 0 0 8/5 11 4
C
       
                
              
 4
1 0 0 3 2 7 17 20
2/3 1 0 0 5/3 11/3 16 21 mod26
1 6/5 1 0 0 8/5 17 2
C
       
                
              
 5
1 0 0 3 2 7 8 23
2/3 1 0 0 5/3 11/3 15 12 mod26
1 6/5 1 0 0 8/5 3 9
C
       
                
              
 6
1 0 0 3 2 7 22 5
2/3 1 0 0 5/3 11/3 10 3 mod26
1 6/5 1 0 0 8/5 7 9
C
       
                
              
 7
1 0 0 3 2 7 15 23
2/3 1 0 0 5/3 11/3 3 9 mod26
1 6/5 1 0 0 8/5 22 1
C
       
                
              
 8
1 0 0 3 2 7 11 8
2/3 1 0 0 5/3 11/3 5 20 mod26
1 6/5 1 0 0 8/5 21 22
C
       
                
              
The new message becomes
15 0 21 21 14 13 0
M X S S L K K
5 4 20 21 2 23 12
C B R S Z U J
9 5 3 9 23 9 1
G C A G Y G Y
8 20 22
F R T
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 116|P a g e
Example 3: Decode the message SNOITAUQE RAENIL by using Caesar cipher algorithm and the
inverse of the matrix
3 2 1
4 1 1
2 0 1
A
  
    
  
Solution:
21 16 17 14 22 3 23
S N O I T A U
19 7 20 3 7 16 11 14
W E R A E N I L
11 12 13
21 22 23
31 32 33
1 0 0
1 0 0
1 0 0
u u u
A LU l u u
l l u
   
        
      
So that
i. U11=3, U12= -2, U13=-1
ii. L21U11=-4, L21U12+U22=1, L21U13+U23=-1
L21=-4/3 U22=-5/3 U23=-7/3
iii. L31U11=2 L31U12+L32U22=0
L31=2/32/3-2+5/3L33=0
L32=-4/5
iv. L31U13+L32U23+U33=1
2/3(-1)+-4(-7/5)+U33=1
-2/3+28/5+U33=1
U33=-69/5
1 0 0 3 2 1
4/3 1 0 0 5/3 7/3
2/3 4/5 1 0 0 59/15
L U
    
          
       
P= (LU)-1 mod26
1
1 2 3 21 0 0
2 5 7 16 7 mod26 7
2 4 5 17 9 17
P
      
      
        
               
2
1 2 3 14 15 15
2 5 7 22 3 mod26 3
2 4 5 3 1 25
P
      
      
        
               
3
1 2 3 23 4 4
2 5 7 19 8 mod26 8
2 4 5 7 1 25
P
      
      
        
               
SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117
www.ijera.com 117|P a g e
4
1 2 3 20 21 21
2 5 7 3 24 mod26 24
2 4 5 7 9 17
P
      
      
        
               
5
1 2 3 16 2 2
2 5 7 11 3 mod26 3
2 4 5 14 16 10
P
      
      
        
               
The remaining values are
0 7 17 15 3 25
A E O M A W
4 8 25 21 24 17
B F W J V O
2 3 10
Z A H
The new message
AEOMAW BFW SVO ZAH
References:
[1] Charles C. Pinter A Book of Abstract algebra second edition
[2] Higher engineering mathematic khanna publishers by Dr. B.S. Grewal 40th edition
[3] Joseph A Gallian contemporary abstract algebra sixth edition 2006
[4] P.B. Bhattachary SK Jain S.R. Nagpaul First course in Linear Algebra 1983

More Related Content

What's hot

BJP ELECTONS WINNING
BJP ELECTONS WINNINGBJP ELECTONS WINNING
BJP ELECTONS WINNINGyash2000007
 
Formation of Triples Consist Some Special Numbers with Interesting Property
Formation of Triples Consist Some Special Numbers with Interesting PropertyFormation of Triples Consist Some Special Numbers with Interesting Property
Formation of Triples Consist Some Special Numbers with Interesting PropertyIRJET Journal
 
2.4 mst prim’s algorithm
2.4 mst  prim’s algorithm2.4 mst  prim’s algorithm
2.4 mst prim’s algorithmKrish_ver2
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s Krish_ver2
 
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...eSAT Journals
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Alexander Litvinenko
 
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONS
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONSZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONS
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONSIAEME Publication
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithmguest862df4e
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
 
Paper computer
Paper computerPaper computer
Paper computerbikram ...
 
A novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunchA novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key buncheSAT Publishing House
 
Kruskal & Prim's Algorithm
Kruskal & Prim's AlgorithmKruskal & Prim's Algorithm
Kruskal & Prim's AlgorithmIfad Rahman
 
Modul matematik tg3
Modul matematik tg3Modul matematik tg3
Modul matematik tg3roszaina71
 
mathematical foundation and C
mathematical foundation and Cmathematical foundation and C
mathematical foundation and Cannalakshmir2
 
IRJET- Total Domatic Number of a Jump Graph
IRJET- Total Domatic Number of a Jump GraphIRJET- Total Domatic Number of a Jump Graph
IRJET- Total Domatic Number of a Jump GraphIRJET Journal
 

What's hot (20)

BJP ELECTONS WINNING
BJP ELECTONS WINNINGBJP ELECTONS WINNING
BJP ELECTONS WINNING
 
Formation of Triples Consist Some Special Numbers with Interesting Property
Formation of Triples Consist Some Special Numbers with Interesting PropertyFormation of Triples Consist Some Special Numbers with Interesting Property
Formation of Triples Consist Some Special Numbers with Interesting Property
 
2.4 mst prim’s algorithm
2.4 mst  prim’s algorithm2.4 mst  prim’s algorithm
2.4 mst prim’s algorithm
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
Network analysis
Network analysisNetwork analysis
Network analysis
 
FDP-libre(1)
FDP-libre(1)FDP-libre(1)
FDP-libre(1)
 
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
 
I034051056
I034051056I034051056
I034051056
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...
 
Ch03-Computer Security
Ch03-Computer SecurityCh03-Computer Security
Ch03-Computer Security
 
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONS
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONSZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONS
ZAGREB INDICES AND ZAGREB COINDICES OF SOME GRAPH OPERATIONS
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
Paper computer
Paper computerPaper computer
Paper computer
 
A novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunchA novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunch
 
D044042432
D044042432D044042432
D044042432
 
Kruskal & Prim's Algorithm
Kruskal & Prim's AlgorithmKruskal & Prim's Algorithm
Kruskal & Prim's Algorithm
 
Modul matematik tg3
Modul matematik tg3Modul matematik tg3
Modul matematik tg3
 
mathematical foundation and C
mathematical foundation and Cmathematical foundation and C
mathematical foundation and C
 
IRJET- Total Domatic Number of a Jump Graph
IRJET- Total Domatic Number of a Jump GraphIRJET- Total Domatic Number of a Jump Graph
IRJET- Total Domatic Number of a Jump Graph
 

Similar to Cryptographic Technique Used Lower and Upper Triangular Decomposition Method

Litvinenko, Uncertainty Quantification - an Overview
Litvinenko, Uncertainty Quantification - an OverviewLitvinenko, Uncertainty Quantification - an Overview
Litvinenko, Uncertainty Quantification - an OverviewAlexander Litvinenko
 
Cryptography Using Laplace Transform
Cryptography Using Laplace TransformCryptography Using Laplace Transform
Cryptography Using Laplace TransformIJERA Editor
 
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...IRJET Journal
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...IJERA Editor
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlineareSAT Publishing House
 
One More Comments on Programming with Big Number Library in Scientific Computing
One More Comments on Programming with Big Number Library in Scientific ComputingOne More Comments on Programming with Big Number Library in Scientific Computing
One More Comments on Programming with Big Number Library in Scientific Computingtheijes
 
Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...eSAT Publishing House
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersTELKOMNIKA JOURNAL
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...IJLT EMAS
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...sipij
 
Burrows wheeler based data compression and secure transmission
Burrows wheeler based data compression and secure transmissionBurrows wheeler based data compression and secure transmission
Burrows wheeler based data compression and secure transmissioneSAT Publishing House
 
Low Power Adaptive FIR Filter Based on Distributed Arithmetic
Low Power Adaptive FIR Filter Based on Distributed ArithmeticLow Power Adaptive FIR Filter Based on Distributed Arithmetic
Low Power Adaptive FIR Filter Based on Distributed ArithmeticIJERA Editor
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersRobert Talbert
 

Similar to Cryptographic Technique Used Lower and Upper Triangular Decomposition Method (20)

Litvinenko, Uncertainty Quantification - an Overview
Litvinenko, Uncertainty Quantification - an OverviewLitvinenko, Uncertainty Quantification - an Overview
Litvinenko, Uncertainty Quantification - an Overview
 
Cryptography Using Laplace Transform
Cryptography Using Laplace TransformCryptography Using Laplace Transform
Cryptography Using Laplace Transform
 
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinear
 
One More Comments on Programming with Big Number Library in Scientific Computing
One More Comments on Programming with Big Number Library in Scientific ComputingOne More Comments on Programming with Big Number Library in Scientific Computing
One More Comments on Programming with Big Number Library in Scientific Computing
 
Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
 
Taller parcial 2
Taller parcial 2Taller parcial 2
Taller parcial 2
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...
 
G029037043
G029037043G029037043
G029037043
 
Burrows wheeler based data compression and secure transmission
Burrows wheeler based data compression and secure transmissionBurrows wheeler based data compression and secure transmission
Burrows wheeler based data compression and secure transmission
 
Project Management Techniques
Project Management TechniquesProject Management Techniques
Project Management Techniques
 
Low Power Adaptive FIR Filter Based on Distributed Arithmetic
Low Power Adaptive FIR Filter Based on Distributed ArithmeticLow Power Adaptive FIR Filter Based on Distributed Arithmetic
Low Power Adaptive FIR Filter Based on Distributed Arithmetic
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
 
ON SQUARING A NUMBER AND T-SEMI PRIME NUMBER
ON SQUARING A NUMBER AND T-SEMI PRIME NUMBER ON SQUARING A NUMBER AND T-SEMI PRIME NUMBER
ON SQUARING A NUMBER AND T-SEMI PRIME NUMBER
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Cryptographic Technique Used Lower and Upper Triangular Decomposition Method

  • 1. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 111|P a g e Cryptographic Technique Used Lower and Upper Triangular Decomposition Method B. KumaraswamyAchary, K. Rama Krishna Prasad, V. Vasu Department of Mathematics, S.V. University, Tirupati Abstract: In this paper, the main cryptographic technique we will use affine cipher used for encryption and also decryption by using one of the linear algebra technique lower and upper triangular technique Key words: Affine cipher, encryption, decryption, lower and upper triangular decomposition. I. Introduction: An encryption scheme or cryptosystem is a tuple (P, C, K, E, D) with the following properties.  P is a set. It is called the plaintext space. Its elements are called plaintext.  C is a set. It is called the cipher text space. Its elements are called cipher text.  K is a set. It is called the key space. Its elements are called keys. Factorization method: This method is based on the fact that every matrix A can be expressed as the product of a lower triangular matrix and an upper triangular matrix provided al the principals minors of a are non-singular.i.e. If A=[aij] then 11 12 13 11 12 11 21 22 23 21 22 31 32 32 0 0, 0 a a a a a a a a a etc a a a a a    Also such a factorization if it exists, is unique. Now consider the equations. 11 1 12 2 13 3 1 21 1 22 2 23 3 2 31 1 32 2 33 3 3 a x a x a x b a x a x a x b a x a x a x b          Which can be written as AX=B where 11 12 13 1 1 21 22 23 2 2 31 32 33 3 3 , , a a a x b A a a a X x B b a a a x b    Let A= LU Where 21 31 32 1 0 0 1 0 1 L l l l  and 11 12 13 22 23 33 0 0 0 u u u U u u u  Then (1) becomes LUX=B Writing UX=V1 (3) Becomes LV=B which is equivalent to the equations V1=b1:l2V1+V2=b2:l31v1+l32v2+v3=b3 Solving these for V1, V2, V3 we know V1 then (4) Becomes U11X1+U12X2+U13X3=V11U22X2+U23X3=V21 RESEARCH ARTICLE OPEN ACCESS
  • 2. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 112|P a g e U33X3=V3 From which x3,x2 and x1 can be found by back-substitution. To compute matrices L and U, we write (2) as 11 12 13 11 12 13 21 22 23 21 22 23 31 32 33 31 32 33 1 0 0 1 0 0 0 0 0 u u u a a a l u u a a a l l u a a a  Multiplying the matrices on the left and equating corresponding elements from both sides, we obtain i) U11=all, u12=a12, u13=a13. ii) L21u11=a21 (or) l21=a21/a11. L31u11=a31 (or) l31=a31/all. iii) L21u21+u22=a22 (or) u22=a22-a21/all a12. L21u13+u23=a23 (or) u23=a23-a21/a11a13. iv) L31u13+l32u22=a32 (or) l32=1/u22 [a32-a31/a11 a12] v) L31u13+l33u23=a33 (or) which gives u33. Thus we compute the elements of L and U in the following set order. i) First row of U. ii) First row of L. iii) Second row of U1 iv) Second row of L1 v) Third row of U1 This procedure can easily be generalized. Affine cipher: The encryption process: In fact, we can summarizethe encryption which is the process of converting plaintext into cipher text in the following steps. a. Choose an (mxm) matrix A=LU which is invertible, where ‘m’ have may be depends on the length of the message that needs to be encrypted. b. Change each plain text to its numerical values, by using the table below. A B C D E F G H I J K L 3 4 5 6 7 8 9 10 11 12 13 14 M N O P Q R S T U V W X 15 16 17 18 19 20 21 22 23 24 25 0 Y Z 1 2 c. Form the (mx1) column vector P, having these numerical values as its entries. d. Get each ciphertext vector C by multiplying A=LU with P and connect each entry of the ciphertext vector to its letter in the alphabet where L is lower triangular matrix and U is upper triangular matrix. The encryption algorithm of this method is C=LUP mod N. Where C is the column vector of the numerical values of ciphertext, P is the column vector of the numerical values of the plaintext, LU AN (mxm) matrix, is the key of the algorithm (this matrix must be invertible because are need the inverse of this matrix for the decryption process) and N is the number of letters of the alphabet used in the cryptography the decryption process: The decryption which is the process of converting the cipher text into plaintext could also be summarized in the following steps: a. Get the inverse of the matrix LU: say (LU)-1. b. Change each ciphertext to its numerical values. c. Put each ciphertext in (mx1) column vector say C.
  • 3. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 113|P a g e d. Get each plaintext vector by multiplying (LU)-1 with C, and connect each plaintext vector to its letter in the alphabet. The decryption algorithm of this method is P (LU)-1 mod N. where (LU)-1 is the inverse of the matrix LU. In general, if A= LU Where 11 12 13 21 22 23 31 32 33 1 0 0 1 0 0 1 0 0 u u u L l U u u l l u                    And 11 1 ... u P P P          then in the encryption process, we get C= LUP mod N. 11 11 12 13 11 21 22 23 1 31 32 33 1 0 0 ... 1 0 0 ... 1 0 0u nn C u u u p l u u C l l u p                                        Here when the size of the matrix A increases, or in other words when increases we will have the following advantages. 1. The cryptography process will be more complex and more difficult to decode. 2. The number of column vectors will decreases and we can encode any message consisting for example of 7 letters by using A(7x7) matrix in only one step. But there is one problem here, that is, it’s not easy to get the inverse of the matrix used in the encryption process as n increases. Below, we give several other ways of using affine cipher technique for encryption. We can use the affine cipher technique to make the hill cipher more complex encryption algorithm here is given as C=LUP+B (mod N) 11 11 12 13 11 1 21 22 23 1 31 32 33 1 1 0 0 ... ... 1 0 0 ... ... ... 1 0 0 .... n n n nn c u u u b b l u u c l l u b b                                     Where A=LU is an invertible matrix and B is a column vector like the vectors C and P. For the decryption P=LU-1C-LU-1B= LU-1(C-B) (mod N) Example 1: Encode the message (welcome) by using affine cipher algorithm where the matrix is 4 1 2 3 A        Sol: First use the table below to convert letters in the message to their numerical values. A B C D E F G H I J K L 3 4 5 6 7 8 9 10 11 12 13 14 M N O P Q R S T U V W X 15 16 17 18 19 20 21 22 23 24 25 0 Y Z 1 2 Put also number O for the space between words. Group the plaintext letters into pairs and add O to fill out the last pairs. W E L C O M E T O 25 7 14 5 17 15 7 0 22 17 0
  • 4. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 114|P a g e 11 12 11 12 21 22 21 11 21 12 22 1 04 1 1 02 3 U U U U A l U l U l U U                         U11=4 V12=1, L21U12+U22=3 L21U11=2 ½ 1+V22=3 L21=2/4=1/2 V22=3-1/2=5/2 1 0 4 1 , 1/ 2 0 0 5/ 2 L U               mod26C LUB  1 1 0 4 1 25 3 mod26 1/ 2 0 0 5/ 2 7 19 C                           2 1 0 4 1 14 9 mod26 1/ 2 0 0 5/ 2 5 17 C                           3 1 0 4 1 17 5 mod26 1/ 2 0 0 5/ 2 15 1 C                           4 1 0 4 1 7 2 mod26 1/ 2 0 0 5/ 2 0 14 C                           5 1 0 4 1 22 1 mod26 1/ 2 0 0 5/ 2 17 17 C                          Now the message becomes 3 19 9 17 5 1 2 14 1 17 A W G O C Y Z L Y O Example 2: Encoding the message (Application of Mathematics) 3 2 7 2 3 1 3 4 1 a            Let 11 12 13 21 22 23 31 32 33 1 0 0 1 0 0 1 0 0 u u u A UL l u u l l u                  11 12 13 21 22 23 31 32 33 3 2 7 1 0 0 2 3 1 1 0 0 3 4 1 1 0 0 u u u l u u l l u                              So that (i) U11=3, U12= 2, U13=7 (ii) L21U11=2, L31U11=3, L21=2/3 L31=1 (iii) L21U12+U22=3, L21U13+U23=1 V22=5/3 U23=11/3 (iv) L31U12+L32U22=4 L32=6/5 (v) L31U13+L32U23+U33=1 U33=-8/5
  • 5. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 115|P a g e Thus 1 0 0 3 2 7 2/3 1 0 0 5/3 11/3 1 6/5 1 0 0 8/5 A LV                     Application of Mathematics 3 18 18 14 11 3 22 11 17 16 178 15 3 22 10 7 15 3 22 11 5 2 1 C=LUP mod M  1 1 0 0 3 2 7 3 15 2/3 1 0 0 5/3 11/3 18 0 mod26 1 6/5 1 0 0 8/5 18 21 C                                          2 1 0 0 3 2 7 14 21 2/3 1 0 0 5/3 11/3 11 14 mod26 1 6/5 1 0 0 8/5 5 13 C                                          3 1 0 0 3 2 7 3 0 2/3 1 0 0 5/3 11/3 22 5 mod26 1 6/5 1 0 0 8/5 11 4 C                                          4 1 0 0 3 2 7 17 20 2/3 1 0 0 5/3 11/3 16 21 mod26 1 6/5 1 0 0 8/5 17 2 C                                          5 1 0 0 3 2 7 8 23 2/3 1 0 0 5/3 11/3 15 12 mod26 1 6/5 1 0 0 8/5 3 9 C                                          6 1 0 0 3 2 7 22 5 2/3 1 0 0 5/3 11/3 10 3 mod26 1 6/5 1 0 0 8/5 7 9 C                                          7 1 0 0 3 2 7 15 23 2/3 1 0 0 5/3 11/3 3 9 mod26 1 6/5 1 0 0 8/5 22 1 C                                          8 1 0 0 3 2 7 11 8 2/3 1 0 0 5/3 11/3 5 20 mod26 1 6/5 1 0 0 8/5 21 22 C                                         The new message becomes 15 0 21 21 14 13 0 M X S S L K K 5 4 20 21 2 23 12 C B R S Z U J 9 5 3 9 23 9 1 G C A G Y G Y 8 20 22 F R T
  • 6. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 116|P a g e Example 3: Decode the message SNOITAUQE RAENIL by using Caesar cipher algorithm and the inverse of the matrix 3 2 1 4 1 1 2 0 1 A            Solution: 21 16 17 14 22 3 23 S N O I T A U 19 7 20 3 7 16 11 14 W E R A E N I L 11 12 13 21 22 23 31 32 33 1 0 0 1 0 0 1 0 0 u u u A LU l u u l l u                     So that i. U11=3, U12= -2, U13=-1 ii. L21U11=-4, L21U12+U22=1, L21U13+U23=-1 L21=-4/3 U22=-5/3 U23=-7/3 iii. L31U11=2 L31U12+L32U22=0 L31=2/32/3-2+5/3L33=0 L32=-4/5 iv. L31U13+L32U23+U33=1 2/3(-1)+-4(-7/5)+U33=1 -2/3+28/5+U33=1 U33=-69/5 1 0 0 3 2 1 4/3 1 0 0 5/3 7/3 2/3 4/5 1 0 0 59/15 L U                         P= (LU)-1 mod26 1 1 2 3 21 0 0 2 5 7 16 7 mod26 7 2 4 5 17 9 17 P                                        2 1 2 3 14 15 15 2 5 7 22 3 mod26 3 2 4 5 3 1 25 P                                        3 1 2 3 23 4 4 2 5 7 19 8 mod26 8 2 4 5 7 1 25 P                                       
  • 7. SurajoAbubakar WadaInt. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 4) February 2016, pp.111-117 www.ijera.com 117|P a g e 4 1 2 3 20 21 21 2 5 7 3 24 mod26 24 2 4 5 7 9 17 P                                        5 1 2 3 16 2 2 2 5 7 11 3 mod26 3 2 4 5 14 16 10 P                                        The remaining values are 0 7 17 15 3 25 A E O M A W 4 8 25 21 24 17 B F W J V O 2 3 10 Z A H The new message AEOMAW BFW SVO ZAH References: [1] Charles C. Pinter A Book of Abstract algebra second edition [2] Higher engineering mathematic khanna publishers by Dr. B.S. Grewal 40th edition [3] Joseph A Gallian contemporary abstract algebra sixth edition 2006 [4] P.B. Bhattachary SK Jain S.R. Nagpaul First course in Linear Algebra 1983