SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
 Name: Mohammad Waqas
 Roll Number: 19CH18
 Subject: Liner Algebra Analytical Geometry (LAAG)
 Date: 27/07/2020
1
Presentation Topic
Application of matrix multiplication
(Cryptography)
2
What is Cryptography
 A cryptogram is a message written according to a secret code (the Greek word
kryptos means “hidden”). This section describes a method of using matrix
multiplication to encode and decode messages.
 Cryptography mainly consist of encryption and decryption
Encryption
 Convert the plain data into numerical by giving A to 1,B to 2,C to 3 and so on.
 Place the numerical in to matrix M of order mn ≥ L.
 Multiply the matrix M with a non-singular matrix A to get the encoded matrix X.
 The determinate of (non singular matrix) A must be equal to ±1.
 Convert the resultant, the encrypted message matrix in to a text message of
length L and that will be send to the receiver.
3
Decryption
 Receiver can form a matrix with the encrypted message.
 Multiply the encoded matrix X with 𝐴−1
to get back the message matrix M.
 Encryption and decryption require the use of some secret information usually referred
as a key.
 This first matrix , used by sender is called the encryption matrix (encoding matrix) and
its inverse is called decryption matrix (decoding matrix) , which is used by the receiver.
 Begin by assigning a number to each letter in the alphabet (with 0 assigned to a blank
space), as follows
4
5Application of cryptography
 Secure communication:
 To prevent eavesdropping war time communication and business transactions
 Secret Sharing / data hiding:
 Hide something that has been written.
 Access Control:
 Regulate access to satellite and cable TV.
 Cell phones:
 Prevent people from stealing cell phone . Access code or evadropping
6
7
8
References
 Book Name: Elementary Linear Algebra
 Author name: Howard Antion and Chris Rorrers
 Edition Number: 11th edition
 Publisher year: 2014
 www.synopsys.com. C.J.R.Berges
9
10

More Related Content

PPTX
cryptography Application of linear algebra
PPTX
Applications of-linear-algebra-hill-cipher
PPTX
Caesar cipher
PPTX
Application of Matrices on Cryptography
DOCX
Applications of Matrices
PPTX
Intro & Applications of Discrete Math
PDF
Graph theory and its applications
PPTX
Linear Algebra Applications
cryptography Application of linear algebra
Applications of-linear-algebra-hill-cipher
Caesar cipher
Application of Matrices on Cryptography
Applications of Matrices
Intro & Applications of Discrete Math
Graph theory and its applications
Linear Algebra Applications

What's hot (20)

PPT
Application of Matrices
DOCX
Applications of linear algebra in field of it
PPTX
Application Of Graph Data Structure
PPTX
Applications of graph theory
PPT
Matrices And Application Of Matrices
DOCX
Number Theory In Cryptography
PDF
Recurrence relation solutions
DOCX
Conversion from infix to prefix using stack
PPTX
Application of Discrete Mathematics in CSE
PPTX
Graph Theory
PPTX
Triangularization method
PPT
Divide and conquer
PDF
NUMERICAL METHOD AND ITS APPLICATION
PPTX
Dijkstra's Algorithm
PPTX
Greedy Algorithms
PPTX
Instruction codes
DOC
Unit 3 daa
PPTX
Divide and Conquer - Part 1
PPTX
Applications of Linear Algebra in Computer Sciences
PPTX
Interesting applications of graph theory
Application of Matrices
Applications of linear algebra in field of it
Application Of Graph Data Structure
Applications of graph theory
Matrices And Application Of Matrices
Number Theory In Cryptography
Recurrence relation solutions
Conversion from infix to prefix using stack
Application of Discrete Mathematics in CSE
Graph Theory
Triangularization method
Divide and conquer
NUMERICAL METHOD AND ITS APPLICATION
Dijkstra's Algorithm
Greedy Algorithms
Instruction codes
Unit 3 daa
Divide and Conquer - Part 1
Applications of Linear Algebra in Computer Sciences
Interesting applications of graph theory
Ad

Similar to Application of matrix multiplication (cryptography) with solved problem (20)

PPT
Encryptolog y-1216310707267721-9
PPT
Cryptography
PPT
Network and Information Security unit2.ppt.ppt
PPTX
Cryptography, Cryptology, Encryption and types
PDF
Computer Security Chapter III.pdf
PPTX
Introduction to Cryptography CYB 303.pptx
PDF
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
PPT
Cyptography and network security
PDF
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
PPTX
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
DOC
Criptography approach using magnets
PPTX
cryptography.pptx
PPT
Lecture 17 (Cryptography).pptngrfiigrhjtf
PPTX
applicationofmatricesoncryptography-220316102307.pptx
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
PPTX
Network security and cryptography
Encryptolog y-1216310707267721-9
Cryptography
Network and Information Security unit2.ppt.ppt
Cryptography, Cryptology, Encryption and types
Computer Security Chapter III.pdf
Introduction to Cryptography CYB 303.pptx
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Cyptography and network security
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Criptography approach using magnets
cryptography.pptx
Lecture 17 (Cryptography).pptngrfiigrhjtf
applicationofmatricesoncryptography-220316102307.pptx
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Vtu network security(10 ec832) unit 2 notes..
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
Network security and cryptography
Ad

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Welding lecture in detail for understanding
PDF
PPT on Performance Review to get promotions
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
DOCX
573137875-Attendance-Management-System-original
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Geodesy 1.pptx...............................................
Automation-in-Manufacturing-Chapter-Introduction.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Welding lecture in detail for understanding
PPT on Performance Review to get promotions
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
573137875-Attendance-Management-System-original
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Operating System & Kernel Study Guide-1 - converted.pdf

Application of matrix multiplication (cryptography) with solved problem

  • 1.  Name: Mohammad Waqas  Roll Number: 19CH18  Subject: Liner Algebra Analytical Geometry (LAAG)  Date: 27/07/2020 1
  • 2. Presentation Topic Application of matrix multiplication (Cryptography) 2
  • 3. What is Cryptography  A cryptogram is a message written according to a secret code (the Greek word kryptos means “hidden”). This section describes a method of using matrix multiplication to encode and decode messages.  Cryptography mainly consist of encryption and decryption Encryption  Convert the plain data into numerical by giving A to 1,B to 2,C to 3 and so on.  Place the numerical in to matrix M of order mn ≥ L.  Multiply the matrix M with a non-singular matrix A to get the encoded matrix X.  The determinate of (non singular matrix) A must be equal to ±1.  Convert the resultant, the encrypted message matrix in to a text message of length L and that will be send to the receiver. 3
  • 4. Decryption  Receiver can form a matrix with the encrypted message.  Multiply the encoded matrix X with 𝐴−1 to get back the message matrix M.  Encryption and decryption require the use of some secret information usually referred as a key.  This first matrix , used by sender is called the encryption matrix (encoding matrix) and its inverse is called decryption matrix (decoding matrix) , which is used by the receiver.  Begin by assigning a number to each letter in the alphabet (with 0 assigned to a blank space), as follows 4
  • 5. 5Application of cryptography  Secure communication:  To prevent eavesdropping war time communication and business transactions  Secret Sharing / data hiding:  Hide something that has been written.  Access Control:  Regulate access to satellite and cable TV.  Cell phones:  Prevent people from stealing cell phone . Access code or evadropping
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. References  Book Name: Elementary Linear Algebra  Author name: Howard Antion and Chris Rorrers  Edition Number: 11th edition  Publisher year: 2014  www.synopsys.com. C.J.R.Berges 9
  • 10. 10