Cryptography and Matrix
Encryption
SUPERVISED BY: Shubha Dhoria Sir
Theory and Mathematical Analysis
Presented by:
• Sonali Sahu
• Gauri Upadhyay
• Yunisha Ratnakar
• Anchal Singh
• Anjali Shriwas
Table of Contents
Introduction to Mathematics in Basics of Linear
Cryptography Cryptography Algebra
Matrix Operations in Hill Cipher
Encryption Overview
Modular Arithmetic Hill Cipher Example Matrix Inverse Modulo
26
Hill Cipher Applications &
Decryption Security
Introduction to
Cryptography
Core Concept
Cryptography transforms information to ensure security.
Usage Areas
Vital in communication, banking, and military systems.
Encryption Types
Includes symmetric and asymmetric methods.
Main Goals
Achieve confidentiality, integrity, and authenticity.
Importance of Mathematics in
Cryptography
Structured Mathematical Key Fields
Approach Functions
Mathematics provides rigor for Ensure data can only be • Linear Algebra
secure encryption and reversed with the correct key. • Number Theory
decryption.
Basics of Linear
Algebra
Vectors and Matrix
Matrices 1 2 Multiplication
Fundamental mathematical Performed using row times column
structures for transformations. method.
Applications Invertible Matrices
Used in block encryption algorithms Can reverse transformations
4 3
like Hill cipher. applied to data.
Matrix Operations in
Encryption
Text to Numbers
Convert letters into numeric vector format.
Encryption
Multiply numeric vectors with a key matrix.
Example
Key A=[[2,3],[1,4]], P=[[5],[6]] → C=A×P=[[28],[29]]
Invertibility
Key matrix must be invertible for decryption.
Introduction to Hill
Cipher
1 Origin
Invented by Lester Hill in 1929.
2 Cipher Type
Block cipher using matrix multiplication.
3 Modular Use
Performs calculations modulo 26 for alphabet letters.
4 Operation
Encrypts m letters using an m×m key matrix.
Modular Arithmetic in
Cryptography
Definition
Values wrap around within a fixed range (0–25).
Examples
• 45 mod 26 = 19
• 54 mod 26 = 2
Applications
Encodes results back into alphabet characters.
Advantage
Prevents overflow in matrix multiplication
results.
Hill Cipher Encryption
Example
Key Matrix Plaintext Calculation Modulo Conversion
A=[[3,3],[2,5]] Text ‘HI’ numeric: [7,8] C=A×P=[[45],[54]] C mod 26=[[19],[2]] →
letters ‘T’ and ‘C’
Matrix Inverse Modulo
26 1 2 3 4
Determinant Inverse of Adjugate Matrix Matrix Inverse
Calculation Determinant Mod
adj(A) = [[5,-3],[- A⁻¹ = 3 × adj(A) mod
26
Det(A) = 3×5 - 3×2 2,3]] → mod 26 = 26 = [[15,17],[20,9]]
=9 9⁻¹ mod 26 = 3 [[5,23],[24,3]]
Hill Cipher Decryption &
Matrix Encryption
This presentation covers Hill cipher decryption, matrix
properties, security, applications, and conclusions.
Hill Cipher Decryption
Example
Encrypted Vector
C = [[19],[2]] used for decryption.
Matrix Inverse
P = A⁻¹ × C = [[15×19 + 17×2],[20×19 + 9×2]] =
[[319],[398]]
Modulo Operation
Mod 26: [[7],[8]] = 'H', 'I' original message recovered.
Reversibility
Decryption works if matrix is invertible.
Determinants and
Inverses
Invertibility
Det(A) ≠ 0 means matrix is invertible.
Singular Matrices
Det = 0 means no decryption possible.
Modulo Inverse
Det(A) mod 26 must have an inverse.
Verification
Always verify matrix before encryption.
Security Aspects of Matrix
Encryption
Matrix Size Key Secrecy Brute-force Layered Security
Difficulty
Larger matrices Randomness and Harder with bigger key Combine with other
increase encryption secrecy of key are matrices. cryptographic layers.
strength. essential.
Real-Life
Applications
Basic Ciphers Advanced
Cryptography
Used in simple encryption and authentication. Foundation for AES, ECC, and RSA algorithms.
Other Uses Mathematical Rigor
Applied in QR codes, steganography, blockchain. Ensures secure and reliable systems.
Mathematics Powers
Encryption
Mathematical
Strength
Matrix encryption shows math's power in security.
Hill Cipher
Demonstrates basic cryptographic principles effectively.
Data Security
Mathematics ensures data integrity and protection.
Career Relevance
Essential knowledge for cybersecurity and data science.
Key Takeaways
Invertible Matrices
Only invertible matrices allow decryption.
Security Layers
Matrix size and key secrecy boost security.
Wide Applications
Matrix encryption underpins many modern systems.
Mathematics Role
Mathematics is fundamental to cryptography.
Next Steps
Learn Matrix Explore
Algebra Cryptography
Master determinants and inverses for Study advanced algorithms like AES and RSA.
encryption.
Apply Knowledge Career Growth
Use matrix encryption in real-world projects. Build skills for cybersecurity and data science
roles.