Encryption Matrices are commonly used to encrypt data. Here is a simple form such an encryption can take. First, we represent each letter in the alphabet by a number, so let us take < space > = 0, A = 1 B = 2, and so on. Thus, for example, "ABORT MISSION" becomes [1 2 15 18 20 0 13 9 19 19 9 15 14]. To encrypt this coded phrase, we use an invertible matrix of any size with integer entries. For instance, let us take A to be the 2 x 2 matrix We can first arrange the coded sequence of numbers in the form of a matrix with two rows (using zero in the last place if we have an odd number of characters) and then multiply on the left by A. 3 21 1 15 20 13 19 9 14 1 ][ 2 18 0 9 19 15 O 7 81 60 57 95 57 42 6 78 80 61 95 51 56 ]' Encrypted Matrix = 4 which we can also write as [7 6 81 78 60 80 57 61 95 95 57 51 42 56]. To decipher the encoded message, multiply the encrypted matrix by A-. The following exercise uses the above matrix A for encoding and decoding. Use the matrix A to encode the phrase "GO TO PLAN B".

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Encryption Matrices are commonly used to encrypt data. Here is a simple form such an encryption can take. First, we represent each letter in the alphabet by a number, so let us take < space > = 0, A = 1,
B = 2, and so on. Thus, for example, "ABORT MISSION" becomes
[1 2 15 18 20 0 13 9 19 19 9 15 14].
To encrypt this coded phrase, we use an invertible matrix of any size with integer entries. For instance, let us take A to be the
3 2
2 x 2 matrix
4 1
We can first arrange the coded sequence of numbers in the form of a matrix with two rows (using zero in the last place if we have an odd number of characters) and then multiply on the left by A.
3 2
1 15 20 13 19 9
14
Encrypted Matrix =
4 1
2 18 0
9.
19 15 0
7 81 60 57 95 57 42
=
6 78 80 61 95 51 56
which we can also write as
[7 6 81 78 60 80 57 61 95 95 57 51 42 56].
To decipher the encoded message, multiply the encrypted matrix by A1. The following exercise uses the above matrix A for encoding and decoding.
Use the matrix A to encode the phrase "GO TO PLAN B".
Need Help?
Read It
Transcribed Image Text:Encryption Matrices are commonly used to encrypt data. Here is a simple form such an encryption can take. First, we represent each letter in the alphabet by a number, so let us take < space > = 0, A = 1, B = 2, and so on. Thus, for example, "ABORT MISSION" becomes [1 2 15 18 20 0 13 9 19 19 9 15 14]. To encrypt this coded phrase, we use an invertible matrix of any size with integer entries. For instance, let us take A to be the 3 2 2 x 2 matrix 4 1 We can first arrange the coded sequence of numbers in the form of a matrix with two rows (using zero in the last place if we have an odd number of characters) and then multiply on the left by A. 3 2 1 15 20 13 19 9 14 Encrypted Matrix = 4 1 2 18 0 9. 19 15 0 7 81 60 57 95 57 42 = 6 78 80 61 95 51 56 which we can also write as [7 6 81 78 60 80 57 61 95 95 57 51 42 56]. To decipher the encoded message, multiply the encrypted matrix by A1. The following exercise uses the above matrix A for encoding and decoding. Use the matrix A to encode the phrase "GO TO PLAN B". Need Help? Read It
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education