Top Banner
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH 2700.002 5/10/2010
27

An Introduction to Hill Ciphers

Feb 23, 2016

Download

Documents

kynan

An Introduction to Hill Ciphers. Using Linear Algebra. Brian Worthington University of North Texas MATH 2700.002 5/10/2010. Hill Ciphers. Created by Lester S. Hill in 1929 Polygraphic Substitution Cipher Uses Linear Algebra to Encrypt and Decrypt. Simple Substitution Ciphers. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: An Introduction to Hill Ciphers

An Introduction to Hill CiphersUsing Linear Algebra

Brian Worthington

University of North Texas

MATH 2700.002

5/10/2010

Page 2: An Introduction to Hill Ciphers

Hill CiphersCreated by Lester S. Hill in 1929Polygraphic Substitution CipherUses Linear Algebra to Encrypt

and Decrypt

Page 3: An Introduction to Hill Ciphers

Simple Substitution CiphersWork by substituting one letter

with another letter.Easy to crack using Frequency

Analysis

Page 4: An Introduction to Hill Ciphers

Letter to Letter SubstitutionA B C D E F G H I J K L MQ W E R T Y U I O P A S D

N O P Q R S T U V W X Y ZF G H J K L Z X C V B N M

Unencrypted = HELLO WORLD

Encrypted = ITSSG VKGSR

Page 5: An Introduction to Hill Ciphers

Polygraphic Substitution CiphersEncrypts letters in groupsFrequency analysis more difficult

Page 6: An Introduction to Hill Ciphers

Hill CiphersPolygraphic substitution cipherUses matrices to encrypt and

decryptUses modular arithmetic (Mod

26)

Page 7: An Introduction to Hill Ciphers

Modular ArithmeticFor a Mod b, divide a by b and

take the remainder.14 ÷ 10 = 1 R 414 Mod 10 = 424 Mod 10 = 4

Page 8: An Introduction to Hill Ciphers

Modulus Theorem

Page 9: An Introduction to Hill Ciphers

Modulus Examples

Page 10: An Introduction to Hill Ciphers

Modular InversesInverse of 2 is ½ (2 · ½ = 1)Matrix Inverse: AA-1= IModular Inverse for Mod m: (a · a-1)

Mod m = 1For Modular Inverses, a and m

must NOT have any prime factors in common

Page 11: An Introduction to Hill Ciphers

Modular Inverses of Mod 26A 1 2 5 7 9 11 15 17 19 21 23 25A-1 1 9 21 15 3 19 7 23 11 5 17 25

Example – Find the Modular Inverse of 9 for Mod 26

9 · 3 = 27

27 Mod 26 = 1

3 is the Modular Inverse of 9 Mod 26

Page 12: An Introduction to Hill Ciphers

Hill Cipher MatricesOne matrix to encrypt, one to

decryptMust be n x n, invertible matricesDecryption matrix must be

modular inverse of encryption matrix in Mod 26

Page 13: An Introduction to Hill Ciphers

Modularly Inverse MatricesCalculate determinant of first matrix

A, det AMake sure that det A has a modular

inverse for Mod 26 Calculate the adjugate of A, adj AMultiply adj A by modular inverse of

det ACalculate Mod 26 of the result to get BUse A to encrypt, B to decrypt

Page 14: An Introduction to Hill Ciphers

Modular Reciprocal Example

Page 15: An Introduction to Hill Ciphers

EncryptionAssign each letter in alphabet a

number between 0 and 25Change message into 2 x 1 letter

vectorsChange each vector into 2 x 1

numeric vectorsMultiply each numeric vector by

encryption matrixConvert product vectors to

letters

Page 16: An Introduction to Hill Ciphers

Letter to Number SubstitutionA B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12

N O P Q R S T U V W X Y Z13 14 15 16 17 18 19 20 21 22 23 24 25

Page 17: An Introduction to Hill Ciphers

Change Message to VectorsMessage to encrypt = HELLO

WORLD

Page 18: An Introduction to Hill Ciphers

Multiply Matrix by Vectors

Page 19: An Introduction to Hill Ciphers

Convert to Mod 26

Page 20: An Introduction to Hill Ciphers

Convert Numbers to Letters

HELLO WORLD has been encrypted to SLHZY ATGZT

Page 21: An Introduction to Hill Ciphers

DecryptionChange message into 2 x 1 letter

vectorsChange each vector into 2 x 1

numeric vectorsMultiply each numeric vector by

decryption matrixConvert new vectors to letters

Page 22: An Introduction to Hill Ciphers

Change Message to VectorsMessage to encrypt = SLHZYATGZT

Page 23: An Introduction to Hill Ciphers

Multiply Matrix by Vectors

Page 24: An Introduction to Hill Ciphers

Convert to Mod 26

Page 25: An Introduction to Hill Ciphers

Convert Numbers to Letters

SLHZYATGZT has been decrypted to HELLO WORLD

Page 26: An Introduction to Hill Ciphers

ConclusionCreating valid

encryption/decryption matrices is the most difficult part of Hill Ciphers.

Otherwise, Hill Ciphers use simple linear algebra and modular arithmetic

Page 27: An Introduction to Hill Ciphers

Questions?