SlideShare a Scribd company logo
1 of 10
L I N E A R A L G E B R A I N
C RY P T O G R A P H Y
C R Y P T O G R A P H Y
• Cryptography term is derived from the Greek
word kryptos, which means hidden and
graphy is writing.
• Cryptography is the study of secure
communications techniques that allow
only the sender and intended recipient of
a message to view its content.
E N C R Y P T I O N
A N D
D E C R Y P T I O N
• Encryption means the process of
transformation of an information (plain
text) into an unreadable form (cipher).
• Decryption means the transformation of
the coded message (cipher text) back
into original from (plain text).
• Encryption and decryption require a
secret technique which is known only to
the sender and the receiver.
• The message to be sent is called the plaintext message. The
disguised message is called the ciphertext. The plaintext and the ciphertext
are both written in an alphabet, consisting of letters or characters. Characters
can include not only the familiar alphabetic characters A, ,…, Z and a, ,…, z but
also digits, punctuation marks, and blanks.
• The secret is called a key. One way of generating a
key is by using a non-singular matrix to encrypt a
message by the sender. The receiver decodes
(decrypts) the message to retrieve the original message
by using the inverse of the matrix. The matrix used for
encryption is called encryption matrix (encoding matrix)
and that used for decoding is called decryption matrix
(decoding matrix).
E X A M P L E
Let the message to sent by the sender be "WELCOME".
Let the encoding matrix be
Since the key is taken as the operation of post multiplication by a square matrix of order 3, the
message is cut into pieces (WEL), (COM), (E), each of length 3 and converted into a sequence
of row matrices of numbers:
[ 23 5 12], [3 15 13], [5 0 0]
[ 23 5 12], [3 15 13], [5 0 0]
Now that, we have included two zeros in the last row matrix. The reason is to get a row
matrix with 5 as the first entry.
Next, we encode the message by post-multiplying each row matrix as given below:
So the encoded message is [45 –28 23] [[46 –18 3] [5 -5 5]
The receiver will decode the message by the reverse key, post- multiplying by thee inverse of A.
The reciever decodes the coded message as follows:
So the sequence of
decoded row matrices is
[23 5 12], [3 15 13], [5 0 0].
Thus the receiver reads the
message as "WELCOME".
T H A N K Y O U

More Related Content

Similar to cryptography.pptx

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 

Similar to cryptography.pptx (20)

Cryptography
CryptographyCryptography
Cryptography
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problem
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Cns 1
Cns 1Cns 1
Cns 1
 
Encryption
EncryptionEncryption
Encryption
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

cryptography.pptx

  • 1. L I N E A R A L G E B R A I N C RY P T O G R A P H Y
  • 2. C R Y P T O G R A P H Y • Cryptography term is derived from the Greek word kryptos, which means hidden and graphy is writing. • Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its content.
  • 3. E N C R Y P T I O N A N D D E C R Y P T I O N • Encryption means the process of transformation of an information (plain text) into an unreadable form (cipher). • Decryption means the transformation of the coded message (cipher text) back into original from (plain text). • Encryption and decryption require a secret technique which is known only to the sender and the receiver.
  • 4. • The message to be sent is called the plaintext message. The disguised message is called the ciphertext. The plaintext and the ciphertext are both written in an alphabet, consisting of letters or characters. Characters can include not only the familiar alphabetic characters A, ,…, Z and a, ,…, z but also digits, punctuation marks, and blanks.
  • 5. • The secret is called a key. One way of generating a key is by using a non-singular matrix to encrypt a message by the sender. The receiver decodes (decrypts) the message to retrieve the original message by using the inverse of the matrix. The matrix used for encryption is called encryption matrix (encoding matrix) and that used for decoding is called decryption matrix (decoding matrix).
  • 6. E X A M P L E Let the message to sent by the sender be "WELCOME". Let the encoding matrix be Since the key is taken as the operation of post multiplication by a square matrix of order 3, the message is cut into pieces (WEL), (COM), (E), each of length 3 and converted into a sequence of row matrices of numbers: [ 23 5 12], [3 15 13], [5 0 0]
  • 7. [ 23 5 12], [3 15 13], [5 0 0] Now that, we have included two zeros in the last row matrix. The reason is to get a row matrix with 5 as the first entry. Next, we encode the message by post-multiplying each row matrix as given below:
  • 8. So the encoded message is [45 –28 23] [[46 –18 3] [5 -5 5] The receiver will decode the message by the reverse key, post- multiplying by thee inverse of A. The reciever decodes the coded message as follows:
  • 9. So the sequence of decoded row matrices is [23 5 12], [3 15 13], [5 0 0]. Thus the receiver reads the message as "WELCOME".
  • 10. T H A N K Y O U