Excel Definitions

Download Report

Transcript Excel Definitions

390 Codes, Ciphers,
and Cryptography
Polygraphic Substitution
Ciphers – Hill’s System
Hill’s System
We now look at the system for enciphering
blocks of text developed by Lester Hill.
 Matrices form the basis of this substitution
cipher!
 We’ll work with blocks of size two letters –
the idea can be generalized to larger
blocks.

2
Steps to Encipher a Message



1. Choose a 2 x 2 matrix
with entries in Z26 for a key.
Make sure that (ad – bc)-1 (mod 26) exists, i.e.
(ad – bc) = 1, 3, 5, 7, 9, 11, 15, 17, 19, 21, 23, or
25.
This will guarantee that A-1 exists (mod 26).
3
Steps to Encipher a Message
2. Split the plaintext into pairs and assign
numbers to each plaintext letter, with a =
1, b = 2, … , z = 26 = 0 (mod 26).
 Plaintext: p1p2|p3p4| … |pn-1pn
 If necessary, append an extra character to
the plaintext to get an even number of
plaintext characters.

4
Steps to Encipher a Message
5
Example 8

Use Hill’s scheme to encipher the
message: “Meet me at the usual place at
ten rather than eight o’clock.”
6
Example 8

Solution: For the key,
choose a 2 x 2 matrix,
with entries in Z26.
Note that
(ad – bc) (mod 26)
= (9*7 – 4*5) (mod 26)
= (63 – 20) (mod 26)
= 43 (mod 26)
= 17 (mod 26)
and 17-1 (mod 26) exists!
 More on this later …

7
Example 8
Next convert the plaintext into pairs of
numbers from Z26:
 me | et | me | at … cl | oc | kz.



13,5 | 5,20 | 13,5 | 1,20 | … 3,12 | 15,3 | 11,0
Now convert the plaintext to numbers to
ciphertext numbers, using (*) above.
8
Example 8
9
Example 8
Thus, “me” is encrypted as “GV”.
 Try the next pair!

10
Example 8
11
Example 8
Thus, “et” is encrypted as “UI”.
 HW – Finish encrypting message!
 Note that for the word “meet”, the first “e”
is encrypted as “G” and the second “e” is
encrypted as “U”.
 Frequency analysis won’t work for this
scheme!

12
Deciphering a Message
To decipher a message encrypted with
Hill’s Scheme, we can use the idea of
matrix inverses!
 Since ciphertext (ck,ck+1) is obtained from
plaintext (pk,pk+1) by multiplying key matrix
A by plaintext (pk,pk+1), all we need to do is
multiply matrix A-1 by ciphertext (ck,ck+1).

13
Deciphering a Message
14
Deciphering a Message
15
Deciphering a Message
The same idea will work for matrices of
numbers from Z26!
 Matrix A will be invertible, provided that
(ad-bc)-1 (mod 26) exists!
 The only difference is that instead of
1/(ad-bc), we need to use (ad-bc)-1.

16
Deciphering a Message
17
Deciphering a Message
18
Deciphering a Message
19
Example 9
Decipher the ciphertext found above in
Example 8!
 Write ciphertext as pairs of numbers in Z26:
 GV | UI
 7,22 | 21,9
 Use the inverse of the key matrix to
decipher!

20
Example 9
21
Example 9
Thus, “GV” is deciphered as “me”.
 Repeat with “UI”.

22
Example 9
23
Example 9

Thus, “UI” is deciphered as “et”.
24
References

Cryptological Mathematics by Robert
Edward Lewand (section on matrices).
25