0% found this document useful (0 votes)
130 views19 pages

Cryptography and Matrix Encryption

The document presents an overview of cryptography, focusing on the role of mathematics, particularly linear algebra, in encryption methods like the Hill cipher. It explains the principles of matrix operations, modular arithmetic, and the importance of invertible matrices for decryption. Additionally, it highlights the security aspects and real-life applications of matrix encryption in various fields.

Uploaded by

kanwarkeshav700
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views19 pages

Cryptography and Matrix Encryption

The document presents an overview of cryptography, focusing on the role of mathematics, particularly linear algebra, in encryption methods like the Hill cipher. It explains the principles of matrix operations, modular arithmetic, and the importance of invertible matrices for decryption. Additionally, it highlights the security aspects and real-life applications of matrix encryption in various fields.

Uploaded by

kanwarkeshav700
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 19

Cryptography and Matrix

Encryption
SUPERVISED BY: Shubha Dhoria Sir

Theory and Mathematical Analysis


Presented by:
• Sonali Sahu
• Gauri Upadhyay
• Yunisha Ratnakar
• Anchal Singh
• Anjali Shriwas
Table of Contents

Introduction to Mathematics in Basics of Linear


Cryptography Cryptography Algebra

Matrix Operations in Hill Cipher


Encryption Overview

Modular Arithmetic Hill Cipher Example Matrix Inverse Modulo


26

Hill Cipher Applications &


Decryption Security
Introduction to
Cryptography
Core Concept
Cryptography transforms information to ensure security.

Usage Areas
Vital in communication, banking, and military systems.

Encryption Types
Includes symmetric and asymmetric methods.

Main Goals
Achieve confidentiality, integrity, and authenticity.
Importance of Mathematics in
Cryptography
Structured Mathematical Key Fields
Approach Functions
Mathematics provides rigor for Ensure data can only be • Linear Algebra
secure encryption and reversed with the correct key. • Number Theory
decryption.
Basics of Linear
Algebra
Vectors and Matrix
Matrices 1 2 Multiplication
Fundamental mathematical Performed using row times column
structures for transformations. method.

Applications Invertible Matrices


Used in block encryption algorithms Can reverse transformations
4 3
like Hill cipher. applied to data.
Matrix Operations in
Encryption
Text to Numbers
Convert letters into numeric vector format.

Encryption
Multiply numeric vectors with a key matrix.

Example
Key A=[[2,3],[1,4]], P=[[5],[6]] → C=A×P=[[28],[29]]

Invertibility
Key matrix must be invertible for decryption.
Introduction to Hill
Cipher
1 Origin
Invented by Lester Hill in 1929.

2 Cipher Type
Block cipher using matrix multiplication.

3 Modular Use
Performs calculations modulo 26 for alphabet letters.

4 Operation
Encrypts m letters using an m×m key matrix.
Modular Arithmetic in
Cryptography
Definition
Values wrap around within a fixed range (0–25).

Examples
• 45 mod 26 = 19
• 54 mod 26 = 2

Applications
Encodes results back into alphabet characters.

Advantage
Prevents overflow in matrix multiplication
results.
Hill Cipher Encryption
Example
Key Matrix Plaintext Calculation Modulo Conversion

A=[[3,3],[2,5]] Text ‘HI’ numeric: [7,8] C=A×P=[[45],[54]] C mod 26=[[19],[2]] →


letters ‘T’ and ‘C’
Matrix Inverse Modulo
26 1 2 3 4

Determinant Inverse of Adjugate Matrix Matrix Inverse


Calculation Determinant Mod
adj(A) = [[5,-3],[- A⁻¹ = 3 × adj(A) mod
26
Det(A) = 3×5 - 3×2 2,3]] → mod 26 = 26 = [[15,17],[20,9]]
=9 9⁻¹ mod 26 = 3 [[5,23],[24,3]]
Hill Cipher Decryption &
Matrix Encryption
This presentation covers Hill cipher decryption, matrix
properties, security, applications, and conclusions.
Hill Cipher Decryption
Example
Encrypted Vector
C = [[19],[2]] used for decryption.

Matrix Inverse
P = A⁻¹ × C = [[15×19 + 17×2],[20×19 + 9×2]] =
[[319],[398]]

Modulo Operation
Mod 26: [[7],[8]] = 'H', 'I' original message recovered.

Reversibility
Decryption works if matrix is invertible.
Determinants and
Inverses
Invertibility
Det(A) ≠ 0 means matrix is invertible.

Singular Matrices
Det = 0 means no decryption possible.

Modulo Inverse
Det(A) mod 26 must have an inverse.

Verification
Always verify matrix before encryption.
Security Aspects of Matrix
Encryption
Matrix Size Key Secrecy Brute-force Layered Security
Difficulty
Larger matrices Randomness and Harder with bigger key Combine with other
increase encryption secrecy of key are matrices. cryptographic layers.
strength. essential.
Real-Life
Applications
Basic Ciphers Advanced
Cryptography
Used in simple encryption and authentication. Foundation for AES, ECC, and RSA algorithms.

Other Uses Mathematical Rigor


Applied in QR codes, steganography, blockchain. Ensures secure and reliable systems.
Mathematics Powers
Encryption
Mathematical
Strength
Matrix encryption shows math's power in security.

Hill Cipher
Demonstrates basic cryptographic principles effectively.

Data Security
Mathematics ensures data integrity and protection.

Career Relevance
Essential knowledge for cybersecurity and data science.
Key Takeaways
Invertible Matrices
Only invertible matrices allow decryption.

Security Layers
Matrix size and key secrecy boost security.

Wide Applications
Matrix encryption underpins many modern systems.

Mathematics Role
Mathematics is fundamental to cryptography.
Next Steps
Learn Matrix Explore
Algebra Cryptography
Master determinants and inverses for Study advanced algorithms like AES and RSA.
encryption.

Apply Knowledge Career Growth


Use matrix encryption in real-world projects. Build skills for cybersecurity and data science
roles.

You might also like