SlideShare a Scribd company logo
1 of 4
Extra Credit
If you choose to do any of this extra credit it is due on the day
of the Final Exam. It will not
be accepted late under any circumstances.
1. (8 points) Cryptography Using Matrices. First an example of
a simple encryption
technique using matrices. Alice wants to send a secret message
to Bob using only capital letters.
She assigns numbers to each of the letters in the alphabet, A =
0, B = 1, C = 2, ..., Z = 25.
She then puts her secret message into a matrix A =
(
12 0
19 7
)
. Here the secret message is
read, 12 0 19 7, in other words, MATH. Alice then multiplies A
on the left by an invertible
matrix B and sends BA to Bob, who has B−1. Once Bob
receives Alice’s matrix he computes
B−1(BA) = (B−1B)A = IA = A and so he has Alice’s matrix,
and hence her secret message.
In this problem,
A is the plaintext, this is the unencrypted message. This is
Alice’s message in the exam-
ple.
BA is the ciphertext, this is the encrypted message. In our
example Alice sends BA to
Bob.
B−1 is the key, which is used to decode the encrypted message.
Bob has the key in our
example.
So to recap,
1. Alice puts her message into a matrix A.
2. Alice multiplies A by an invertible matrix B and sends BA to
Bob who has B−1.
3. Bob who has both B−1 and BA now can compute A since
B−1(BA) = A.
(a) Suppose Alice puts her secret message into a matrix A,
multiplies it by B and sends
BA =
(
57 114
91 178
)
to Bob who has B−1 =
(
−3 2
5
2
−3
2
)
. What is Alice’s secret message?
(b) As above suppose Alice puts her secret message into a
matrix A, multiplies it by B and
sends BA to Bob who has B−1. Unknown to Alice, Eve is aware
of Alice’s encryption method
and has intercepted the ciphertext BA =
(
1 2
3 1
)
. Moreover, Eve has managed to get B from
Bob but she can only make out some of the numbers. She has
B−1 =
(
1 2
3 x
)
where she has
determined that x is either 1, 2, or 6. List all the possible
plaintexts. Hint: Be careful!
2. (4 points) Use mathematical induction to prove A =
(
2 0
0 3
)n
=
(
2n 0
0 3n
)
for every
positive integer n.
3. (7 points) Use mathematical induction to prove (PDP −1)n =
PDnP −1 for every positive
integer n. Here P and D are matrices and P is invertible.

More Related Content

More from mydrynan

CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
mydrynan
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
mydrynan
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
mydrynan
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
mydrynan
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
mydrynan
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
mydrynan
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
mydrynan
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
mydrynan
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
mydrynan
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
mydrynan
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
mydrynan
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
mydrynan
 
CSC-162 Final ProjectMedia LibraryCreate a program that will.docx
CSC-162 Final ProjectMedia LibraryCreate a program that will.docxCSC-162 Final ProjectMedia LibraryCreate a program that will.docx
CSC-162 Final ProjectMedia LibraryCreate a program that will.docx
mydrynan
 
CSC 240Lab 31) Update the specifications of the DeleteItem f.docx
CSC 240Lab 31) Update the specifications of the DeleteItem f.docxCSC 240Lab 31) Update the specifications of the DeleteItem f.docx
CSC 240Lab 31) Update the specifications of the DeleteItem f.docx
mydrynan
 
CSA CCM V3.0.1 CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
CSA CCM V3.0.1  CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docxCSA CCM V3.0.1  CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
CSA CCM V3.0.1 CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
mydrynan
 
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docxCS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
mydrynan
 
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docxCSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
mydrynan
 
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docxCSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
mydrynan
 
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docxCS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
mydrynan
 

More from mydrynan (20)

CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
 
Cryptography KeysCryptography provides confidentiality, inte.docx
Cryptography KeysCryptography provides confidentiality, inte.docxCryptography KeysCryptography provides confidentiality, inte.docx
Cryptography KeysCryptography provides confidentiality, inte.docx
 
CSC-162 Final ProjectMedia LibraryCreate a program that will.docx
CSC-162 Final ProjectMedia LibraryCreate a program that will.docxCSC-162 Final ProjectMedia LibraryCreate a program that will.docx
CSC-162 Final ProjectMedia LibraryCreate a program that will.docx
 
CSC 240Lab 31) Update the specifications of the DeleteItem f.docx
CSC 240Lab 31) Update the specifications of the DeleteItem f.docxCSC 240Lab 31) Update the specifications of the DeleteItem f.docx
CSC 240Lab 31) Update the specifications of the DeleteItem f.docx
 
CSA CCM V3.0.1 CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
CSA CCM V3.0.1  CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docxCSA CCM V3.0.1  CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
CSA CCM V3.0.1 CLOUD CONTROLS MATRIX VERSION 3.0.1Control DomainC.docx
 
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docxCS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
CS672 – System Engineering and Analysis Discussion 6 - 1192018.docx
 
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docxCSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
CSA CCM V3.0CLOUD CONTROLS MATRIX VERSION 3.0Control DomainCCM V3..docx
 
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docxCSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
CSB Hoeganaes Corporation Case Study 1Hoeganaes Corporatio.docx
 
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docxCS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
CS672 – System Engineering and Analysis Discussion 8 - 1123201.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Extra CreditIf you choose to do any of this extra credit i.docx

  • 1. Extra Credit If you choose to do any of this extra credit it is due on the day of the Final Exam. It will not be accepted late under any circumstances. 1. (8 points) Cryptography Using Matrices. First an example of a simple encryption technique using matrices. Alice wants to send a secret message to Bob using only capital letters. She assigns numbers to each of the letters in the alphabet, A = 0, B = 1, C = 2, ..., Z = 25. She then puts her secret message into a matrix A = ( 12 0 19 7 ) . Here the secret message is read, 12 0 19 7, in other words, MATH. Alice then multiplies A on the left by an invertible matrix B and sends BA to Bob, who has B−1. Once Bob receives Alice’s matrix he computes B−1(BA) = (B−1B)A = IA = A and so he has Alice’s matrix, and hence her secret message. In this problem, A is the plaintext, this is the unencrypted message. This is Alice’s message in the exam-
  • 2. ple. BA is the ciphertext, this is the encrypted message. In our example Alice sends BA to Bob. B−1 is the key, which is used to decode the encrypted message. Bob has the key in our example. So to recap, 1. Alice puts her message into a matrix A. 2. Alice multiplies A by an invertible matrix B and sends BA to Bob who has B−1. 3. Bob who has both B−1 and BA now can compute A since B−1(BA) = A. (a) Suppose Alice puts her secret message into a matrix A, multiplies it by B and sends BA = ( 57 114 91 178 ) to Bob who has B−1 = ( −3 2 5 2
  • 3. −3 2 ) . What is Alice’s secret message? (b) As above suppose Alice puts her secret message into a matrix A, multiplies it by B and sends BA to Bob who has B−1. Unknown to Alice, Eve is aware of Alice’s encryption method and has intercepted the ciphertext BA = ( 1 2 3 1 ) . Moreover, Eve has managed to get B from Bob but she can only make out some of the numbers. She has B−1 = ( 1 2 3 x ) where she has determined that x is either 1, 2, or 6. List all the possible plaintexts. Hint: Be careful!
  • 4. 2. (4 points) Use mathematical induction to prove A = ( 2 0 0 3 )n = ( 2n 0 0 3n ) for every positive integer n. 3. (7 points) Use mathematical induction to prove (PDP −1)n = PDnP −1 for every positive integer n. Here P and D are matrices and P is invertible.