Download - An Introduction to Cryptography
![Page 1: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/1.jpg)
An Introduction to Cryptography
TEA fellowsFebruary 9, 2012
Dr. Kristen Abernathy
![Page 2: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/2.jpg)
Applications of cryptography include:
•ATM cards
•Computer passwords
•Electronic commerce
Early cryptographers encoded messages using transposition ciphers (rearranging the letters) or substitution ciphers (replacing letters with other letters).
Examples:
•Loleh tuedssnt
• Transposition cipher
• Lzsg hr etm
• Substitution cipher
Key
![Page 3: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/3.jpg)
Encryption is the transformation of data into some unreadable form. Its
purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not
intended, even those who can see the encrypted data.
Decryption is the reverse of encryption; it is the transformation of encrypted data back into some intelligible form.
![Page 4: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/4.jpg)
WHERE DOES MATH FIT IN?
We can use matrix algebra to encrypt data! If we use large matrices to encrypt our message, the code is extremely difficult to break.
However, the receiver of the message can simply decode the data using the inverse of the matrix.
![Page 5: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/5.jpg)
“ATTACK AT DAWN”
Let’s choose our message to be
ATTACK AT DAWN
and we’ll choose for our encoding matrix
![Page 6: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/6.jpg)
“ATTACK AT DAWN”
We’ll assign a numeric value to each letter of the alphabet:
We’ll also assign the value 27 to represent a space between two words.
![Page 7: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/7.jpg)
“ATTACK AT DAWN”
Assigning these numeric values, our message becomes
A T T A C K * A T * D A W N1 20 20 1 3 11 27 1 20 27 4 1 23 14Since we are using a 3x3 matrix, we break our message into a collection of 3x1 vectors:
![Page 8: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/8.jpg)
“ATTACK AT DAWN”
We can now encode our message by multiplying our 3x3 encoding matrix by the 3x5 matrix formed from the vectors formed from the message:
![Page 9: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/9.jpg)
COMPUTER TIME!
• Log on as “visitor”
• Password is “winthrop”
• Open the program “Wolfram Mathematica 8”
• Click on the option: (Create New) Notebook
![Page 10: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/10.jpg)
“ATTACK AT DAWN”Using Mathematica, we see the product of the encoding matrix and our message is:
![Page 11: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/11.jpg)
In order to decipher this code, we need to re-form our 3x1 vectors:
and multiply by the inverse of the encoding matrix…
The string of numbers we would send in our message is:17, 40, 144, 32, 14, 57, -4, 21, 191, -89, 5, 124, -3, 41, 242
![Page 12: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/12.jpg)
![Page 13: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/13.jpg)
Using our key:
we can decode the message
1 20 20 1 3 11 27 1 20 27 4 1 23 14 27A T T A C K * A T * D A W N *
When we multiply my the inverse of the encoding matrix, we get the vectors:
![Page 14: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/14.jpg)
YOUR TURN!With the same key as before:
and the encoding matrix:
decode the message:
211, 605, 310, 1355, 246, 1970, 692, 379, 204, 1136, 488, 259, 318, 2125, 730, 1493, 349, 2632, 953, 1641, 162, 1466, 350, 977, 406, 1905, 712, 1977
![Page 15: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/15.jpg)
3 15 14 7 18 1 20 21 12 1 20 9 15 14 19 27 25 15 21 27 4 9 4 27 9 20 27 27C O N G R A T U L A T I O N S * Y O U * D I D * I T * *
![Page 16: An Introduction to Cryptography](https://reader035.vdocuments.mx/reader035/viewer/2022062309/5681449e550346895db1580d/html5/thumbnails/16.jpg)
NOW YOU GIVE IT A TRY!
Come up with your own secret message and trade with your neighbor!