SlideShare a Scribd company logo
3
Most read
4
Most read
6
Most read
INNOVATIVE EXAMINATION
Applications of Matrices In Cryptography
PRENENTED BY,
RAM GUPTA
SIDDHARTH GUPTA
VIJAY GUPTA
PIYUSH JAIN
CONTENTS
 Cryptography
 Application of Matrix in Cryptography
 Encoding
 Transmission
 Decoding
 Decoded Message
CRYPTOGRAPHY
 Cryptography, is concerned with keeping communications private.
 Cryptography mainly consists of Encryption and Decryption.
 Encryption is the transformation of data into some unreadable form.
 Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is
not intended, even those who can see the encrypted data.
 Decryption is the reverse of Encryption.
 It is the transformation of encrypted data back into some intelligible form.
 Encryption and Decryption require the use of some secret information, usually referred to as a key.
 Depending on the encryption mechanism used, the same key might be for both encryption and
decryption, while for other mechanism , the keys used for encryption and decryption might be
different.
APPLICATIONS OF MATRIX IN CRYPTOGRAPHY
 One type of code, which is extremely difficult to break, makes use of a
large matrix to encode a message.
 The receiver of the message decodes it using the inverse of the matrix.
 This first matrix, used by the sender is called the encoding matrix and its
inverse is called the decoding matrix, which is used by the receiver.
Message to be sent:
PREPARE TO NEGOTIATE
And the encoding matrix be
We assign a number for each letter of the alphabet.
Such that A is 1, B is 2, and so on. Also, we assign the number 27 to space between two
words. Thus the message becomes:
ENCODING
 Since we are using a 3 by 3 matrix, we break the enumerated message above into a sequence of
3 by 1 vectors.
 Note that it was necessary to add a space at the end of the message to complete the last vector.
 We encode the message by multiplying each of the above vectors by the encoding matrix.
 We represent above vectors as columns of a matrix and perform its matrix multiplication with
the encoding matrix.
 We get,
• The columns of the matrix give the encoded message
• Encoding is complete.
TRANSMISSION
The message is transmitted in a linear form.
DECODING
 To decode the message:
 The receiver writes this string as a sequence of 3 by 1 column matrices and repeats the technique using
the inverse of the encoding matrix.
 The inverse of this encoding matrix is the decoding matrix.
 The inverse of this encoding matrix is the decoding matrix.
 Matrix obtained is
DECODED MESSAGE
The column of this matrix, written in linear form, give the original message
Message received:
PREPARE TO NEGOTIATE
THANK YOU!😊
REFRENCE LINKS:
https://www.slideshare.net/mailrenuka/matrices-and-
application-of-matrices

More Related Content

PPT
Application of Matrices
PPT
Matrices And Application Of Matrices
PPTX
Presentation on application of matrix
PPTX
Matrix and it's Application
PPTX
Applications of Matrices in Engineering
PPTX
Applications of matrices in real life
PPTX
Use of matrix in daily life
DOCX
Applications of Matrices
Application of Matrices
Matrices And Application Of Matrices
Presentation on application of matrix
Matrix and it's Application
Applications of Matrices in Engineering
Applications of matrices in real life
Use of matrix in daily life
Applications of Matrices

What's hot (20)

PPTX
Matrices in computer applications
PPTX
cryptography Application of linear algebra
PPTX
Application of matrix multiplication (cryptography) with solved problem
PPTX
Cryptography an application of vectors and matrices
PPTX
Cryptanalysis
PPTX
Matrix Representation Of Graph
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography.ppt
PPTX
USE OF MATRIX IN ROBOTICS
PPTX
Cryptography
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Cryptography and applications
PPTX
Discrete Time Fourier Transform
PDF
Introduction to Cryptography
PDF
Working principle of Turing machine
PPTX
Cryptography - Discrete Mathematics
PDF
Graph theory and its applications
PPTX
Engineering mathematics presentation
PPTX
Caesar cipher
Matrices in computer applications
cryptography Application of linear algebra
Application of matrix multiplication (cryptography) with solved problem
Cryptography an application of vectors and matrices
Cryptanalysis
Matrix Representation Of Graph
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography.ppt
USE OF MATRIX IN ROBOTICS
Cryptography
Block Ciphers and the Data Encryption Standard
Cryptography and applications
Discrete Time Fourier Transform
Introduction to Cryptography
Working principle of Turing machine
Cryptography - Discrete Mathematics
Graph theory and its applications
Engineering mathematics presentation
Caesar cipher
Ad

Similar to Application of Matrices on Cryptography (20)

PPTX
140050119047vcla-151014091158-lva1-app6892 (1).pptx
PPTX
PPTX
matrix -cryptography 1.pptx
PPT
TN 112_Lecture_5_15th_Jan_2024.ppt for cyber
PPTX
Application of matrices in cryptography
PPTX
cryptography.pptx
PPTX
Application of matrices in Daily life
PDF
International journal of computer science and innovation vol 2015-n2-paper5
PPTX
Application of Matrices in real life | Matrices application | The Matrices
PDF
APPLICATIONS OF MATRICESCryptographyCryptography involves encryp.pdf
PDF
linear algebra.pdf
PPTX
Applications of Linear Algebra
PPTX
Application of matrices in real life and matrix
DOCX
Extra CreditIf you choose to do any of this extra credit i.docx
PDF
Message coding using matrices
PDF
Application of linear transformation in computer
PPTX
Maths in Cryptography final.pptx
PPTX
Coding And Decoding
PPTX
Cryptography
PPTX
Applications of linear algebra
140050119047vcla-151014091158-lva1-app6892 (1).pptx
matrix -cryptography 1.pptx
TN 112_Lecture_5_15th_Jan_2024.ppt for cyber
Application of matrices in cryptography
cryptography.pptx
Application of matrices in Daily life
International journal of computer science and innovation vol 2015-n2-paper5
Application of Matrices in real life | Matrices application | The Matrices
APPLICATIONS OF MATRICESCryptographyCryptography involves encryp.pdf
linear algebra.pdf
Applications of Linear Algebra
Application of matrices in real life and matrix
Extra CreditIf you choose to do any of this extra credit i.docx
Message coding using matrices
Application of linear transformation in computer
Maths in Cryptography final.pptx
Coding And Decoding
Cryptography
Applications of linear algebra
Ad

Recently uploaded (20)

DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
famous lake in india and its disturibution and importance
PDF
HPLC-PPT.docx high performance liquid chromatography
PPTX
2Systematics of Living Organisms t-.pptx
PPTX
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
PPT
protein biochemistry.ppt for university classes
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PDF
Sciences of Europe No 170 (2025)
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
Viruses (History, structure and composition, classification, Bacteriophage Re...
INTRODUCTION TO EVS | Concept of sustainability
. Radiology Case Scenariosssssssssssssss
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
Phytochemical Investigation of Miliusa longipes.pdf
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
famous lake in india and its disturibution and importance
HPLC-PPT.docx high performance liquid chromatography
2Systematics of Living Organisms t-.pptx
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
protein biochemistry.ppt for university classes
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Introduction to Fisheries Biotechnology_Lesson 1.pptx
Sciences of Europe No 170 (2025)
Classification Systems_TAXONOMY_SCIENCE8.pptx
Biophysics 2.pdffffffffffffffffffffffffff
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Comparative Structure of Integument in Vertebrates.pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
AlphaEarth Foundations and the Satellite Embedding dataset

Application of Matrices on Cryptography

  • 1. INNOVATIVE EXAMINATION Applications of Matrices In Cryptography PRENENTED BY, RAM GUPTA SIDDHARTH GUPTA VIJAY GUPTA PIYUSH JAIN
  • 2. CONTENTS  Cryptography  Application of Matrix in Cryptography  Encoding  Transmission  Decoding  Decoded Message
  • 3. CRYPTOGRAPHY  Cryptography, is concerned with keeping communications private.  Cryptography mainly consists of Encryption and Decryption.  Encryption is the transformation of data into some unreadable form.  Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data.  Decryption is the reverse of Encryption.  It is the transformation of encrypted data back into some intelligible form.  Encryption and Decryption require the use of some secret information, usually referred to as a key.  Depending on the encryption mechanism used, the same key might be for both encryption and decryption, while for other mechanism , the keys used for encryption and decryption might be different.
  • 4. APPLICATIONS OF MATRIX IN CRYPTOGRAPHY  One type of code, which is extremely difficult to break, makes use of a large matrix to encode a message.  The receiver of the message decodes it using the inverse of the matrix.  This first matrix, used by the sender is called the encoding matrix and its inverse is called the decoding matrix, which is used by the receiver.
  • 5. Message to be sent: PREPARE TO NEGOTIATE And the encoding matrix be We assign a number for each letter of the alphabet. Such that A is 1, B is 2, and so on. Also, we assign the number 27 to space between two words. Thus the message becomes:
  • 6. ENCODING  Since we are using a 3 by 3 matrix, we break the enumerated message above into a sequence of 3 by 1 vectors.  Note that it was necessary to add a space at the end of the message to complete the last vector.  We encode the message by multiplying each of the above vectors by the encoding matrix.  We represent above vectors as columns of a matrix and perform its matrix multiplication with the encoding matrix.
  • 7.  We get, • The columns of the matrix give the encoded message • Encoding is complete.
  • 8. TRANSMISSION The message is transmitted in a linear form.
  • 9. DECODING  To decode the message:  The receiver writes this string as a sequence of 3 by 1 column matrices and repeats the technique using the inverse of the encoding matrix.  The inverse of this encoding matrix is the decoding matrix.  The inverse of this encoding matrix is the decoding matrix.  Matrix obtained is
  • 10. DECODED MESSAGE The column of this matrix, written in linear form, give the original message Message received: PREPARE TO NEGOTIATE