SlideShare a Scribd company logo
1 of 22
Application of
Matrices in
Cryptography
Researchers: Laiz, Princess Pauline & Reponte Charmagne
E
D
M
-
1
3
2
1
Table of Contents
We will talk about
this first.
We will talk about
this second.
Then we will talk
about this.
01 Introduction 02 Statement of the Problem
03 Definition of terms
After that we will
talk about this.
04 Discussion
2
05 Summary, Conclusions, Recommendations
And we will talk
about this last.
Cryptography, the discipline of encrypting and
decrypting messages encoded in secret codes, has
played a critical role in information security.
The Hill Algorithm, a form of encryption that
uses matrix multiplication and matrix inverses,
represented the introduction of modern
mathematical theory and methods to the area of
cryptography.
Introduction
3
This paper aims to discuss the application
of matrices in cryptography. It also aims
to figure out how to produce keys using
Hill Cyphers to encrypt and descrypt
words.
Statement of
the Problem
4
Specifically, it will answer the following subquestions:
1.
What is the effectiveness of using matrices in cryptography in terms of
the level of security when sending or receiving information that required
confidentiality?
2.
What is the process of producing keys using Hill Cyphers to encrypt
and decrypt words?
3.
What are the determinants that make a matrix qualified to be used as a
key for cyphers?
5
Definition of
terms
6
Matrices (plural), is a
rectangular array of numbers,
symbols or expressions that are
arranged in rows and columns and
are frequently written in box
brackets (Lumen Learning, n.d.).
A term that refers to the
process of converting plain text
into unintelligible text, and
vice versa.
It is a technique for storing
and transmitting data in a
specific format that only the
intended receiver can read and
process (Wanjonhi,2021).
Cryptography Matrix
7
● Matrices
● Cryptography
● Hill Cypher
● Encryption and Decryption with Hill Cipher
● Cracking the Hill Cypher
Discussion
8
Matrix is a Latin term that means “womb”. Matrix is an ordered
arrangement of a number or symbols in particular, rows and columns
contained by brackets, subscribed by magnitude of order, and labeled
by capital letters.
― Meyer & Siam (2009)
9
Matrices
Operations on Matrices
― Chattaroy, Majhi, & Rath (2013)
10
Matrices can be added, subtracted and multiplied. Other than this, we
also have matrix transpose, matrix adjoint, inverse, conjugate, trans
conjugate which are also operations on matrices.
Determinants that make a matrix
qualified as a key for cyphers
― Abdullah, Khalaf & Riza (2015)
11
Hill Cipher uses matrix multiplication and inverse matrix techniques.
The K-matrix n x n where n is the block size, that will generate the
key must be an invertible matrix with inverse ( 𝐾−1 ),because the 𝐾−1
matrix is the decoding key, hence they must have an inverse.
Cryptography
― Chua (2006)
12
Cryptography is an interdisciplinary topic that incorporates ideas
from other areas. In today’s world, cryptography takes extensive use
of computer science and mathematics, particularly discrete
mathematics.
Hill Cipher
― Stallings (2005)
13
It was created by Lester Hill, a mathematician. Matrix operations are
at the core of the Hill Cipher. Each character in the Hill Cipher is
given a numerical value in reverse order or in any order that suits
your needs.
Encryption with Hill Cipher
14
In general, the Hill Cipher Encryption uses the structure of numbers
and letters shown below:
Encryption with Hill Cipher
15
Let’s have a look at a simple encryption. We’ll encrypt with a 3 x 3 key matrix for
convenience. “PRETTY YOU” is the message we wish to encrypt:
From the word “PRETTY YOU”, after multiplying it by our key
matrix, the encrypted message we got is “CNPYTT EIY”.
Decryption with Hill Cipher
16
Given the key matrix in the encryption, we got the decoding matrix which is:
We decoded the encrypted message which is “PRETTY YOU”.
Cracking the Hill Cipher
― Pugliano and Sehestedt (2017)
17
Cracking the cipher was a difficult undertaking when it was initially
devised. Cracking the message by hand took a long time because there
were so many possible key matrices and the cipher hides repeated
letters. The “Plain Text Attack” is a method for cracking the Hill
Cypher that was devised.
Summary,
Conclusions
and
Recommendations
18
Summary
19
Upon the consolidation of some existing researches, the usage of
matrices in cryptography was observed particularly in the Hill
Cipher. Research had shown how encryption and decryption with Hill
Cipher works and the matrix operations which is at the core of this
cipher have been fully discussed in this research.
Conclusions
20
While the Hill Cipher was a breakthrough in encryption when it was
invented in 1929, it does not give the level of security required to
convey anything remotely private or secret in today’s environment.
It’s vulnerable to a variety of attacks, and if the cipher is
cracked, messages can be intercepted and forwarded without either
party knowing.
Recommendations
21
Future study into different types of ciphers that use matrices in
encryption and decryption should be increased as suggested by the
researchers, because it will widen our understanding of how
beneficial matrices may be in cryptography. It will also be
interesting to see if future researchers investigate the use of
matrices in real life and in other domains.
Thank you!
Do you have any questions? Feel free to send
it to the e-mails provided below.
princesspauline.laiz@msugensan.edu.ph
charmagne.reponte@msugensan.edu.ph
22
T
H
A
N
K
Y
O
U


More Related Content

Similar to Application of Matrices in Cryptography

A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matricesdianasc04
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYHome
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6FRSecure
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Persistent Systems Ltd.
 
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Pratyush Rao
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantumijaia
 

Similar to Application of Matrices in Cryptography (20)

A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matrices
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHY
 
H42063743
H42063743H42063743
H42063743
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
 
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

Application of Matrices in Cryptography

  • 1. Application of Matrices in Cryptography Researchers: Laiz, Princess Pauline & Reponte Charmagne E D M - 1 3 2 1
  • 2. Table of Contents We will talk about this first. We will talk about this second. Then we will talk about this. 01 Introduction 02 Statement of the Problem 03 Definition of terms After that we will talk about this. 04 Discussion 2 05 Summary, Conclusions, Recommendations And we will talk about this last.
  • 3. Cryptography, the discipline of encrypting and decrypting messages encoded in secret codes, has played a critical role in information security. The Hill Algorithm, a form of encryption that uses matrix multiplication and matrix inverses, represented the introduction of modern mathematical theory and methods to the area of cryptography. Introduction 3
  • 4. This paper aims to discuss the application of matrices in cryptography. It also aims to figure out how to produce keys using Hill Cyphers to encrypt and descrypt words. Statement of the Problem 4
  • 5. Specifically, it will answer the following subquestions: 1. What is the effectiveness of using matrices in cryptography in terms of the level of security when sending or receiving information that required confidentiality? 2. What is the process of producing keys using Hill Cyphers to encrypt and decrypt words? 3. What are the determinants that make a matrix qualified to be used as a key for cyphers? 5
  • 7. Matrices (plural), is a rectangular array of numbers, symbols or expressions that are arranged in rows and columns and are frequently written in box brackets (Lumen Learning, n.d.). A term that refers to the process of converting plain text into unintelligible text, and vice versa. It is a technique for storing and transmitting data in a specific format that only the intended receiver can read and process (Wanjonhi,2021). Cryptography Matrix 7
  • 8. ● Matrices ● Cryptography ● Hill Cypher ● Encryption and Decryption with Hill Cipher ● Cracking the Hill Cypher Discussion 8
  • 9. Matrix is a Latin term that means “womb”. Matrix is an ordered arrangement of a number or symbols in particular, rows and columns contained by brackets, subscribed by magnitude of order, and labeled by capital letters. ― Meyer & Siam (2009) 9 Matrices
  • 10. Operations on Matrices ― Chattaroy, Majhi, & Rath (2013) 10 Matrices can be added, subtracted and multiplied. Other than this, we also have matrix transpose, matrix adjoint, inverse, conjugate, trans conjugate which are also operations on matrices.
  • 11. Determinants that make a matrix qualified as a key for cyphers ― Abdullah, Khalaf & Riza (2015) 11 Hill Cipher uses matrix multiplication and inverse matrix techniques. The K-matrix n x n where n is the block size, that will generate the key must be an invertible matrix with inverse ( 𝐾−1 ),because the 𝐾−1 matrix is the decoding key, hence they must have an inverse.
  • 12. Cryptography ― Chua (2006) 12 Cryptography is an interdisciplinary topic that incorporates ideas from other areas. In today’s world, cryptography takes extensive use of computer science and mathematics, particularly discrete mathematics.
  • 13. Hill Cipher ― Stallings (2005) 13 It was created by Lester Hill, a mathematician. Matrix operations are at the core of the Hill Cipher. Each character in the Hill Cipher is given a numerical value in reverse order or in any order that suits your needs.
  • 14. Encryption with Hill Cipher 14 In general, the Hill Cipher Encryption uses the structure of numbers and letters shown below:
  • 15. Encryption with Hill Cipher 15 Let’s have a look at a simple encryption. We’ll encrypt with a 3 x 3 key matrix for convenience. “PRETTY YOU” is the message we wish to encrypt: From the word “PRETTY YOU”, after multiplying it by our key matrix, the encrypted message we got is “CNPYTT EIY”.
  • 16. Decryption with Hill Cipher 16 Given the key matrix in the encryption, we got the decoding matrix which is: We decoded the encrypted message which is “PRETTY YOU”.
  • 17. Cracking the Hill Cipher ― Pugliano and Sehestedt (2017) 17 Cracking the cipher was a difficult undertaking when it was initially devised. Cracking the message by hand took a long time because there were so many possible key matrices and the cipher hides repeated letters. The “Plain Text Attack” is a method for cracking the Hill Cypher that was devised.
  • 19. Summary 19 Upon the consolidation of some existing researches, the usage of matrices in cryptography was observed particularly in the Hill Cipher. Research had shown how encryption and decryption with Hill Cipher works and the matrix operations which is at the core of this cipher have been fully discussed in this research.
  • 20. Conclusions 20 While the Hill Cipher was a breakthrough in encryption when it was invented in 1929, it does not give the level of security required to convey anything remotely private or secret in today’s environment. It’s vulnerable to a variety of attacks, and if the cipher is cracked, messages can be intercepted and forwarded without either party knowing.
  • 21. Recommendations 21 Future study into different types of ciphers that use matrices in encryption and decryption should be increased as suggested by the researchers, because it will widen our understanding of how beneficial matrices may be in cryptography. It will also be interesting to see if future researchers investigate the use of matrices in real life and in other domains.
  • 22. Thank you! Do you have any questions? Feel free to send it to the e-mails provided below. princesspauline.laiz@msugensan.edu.ph charmagne.reponte@msugensan.edu.ph 22 T H A N K Y O U 