Professional Documents
Culture Documents
Table of Contents
Expectations3 Background.3 Enciphering a Message..4 Deciphering a Message: Known Enciphering Matrix..7 Deciphering a Message: Unknown Enciphering Matrix.11 Conclusion.16 Appendix.17 Glossary.17 References17
Expectations
**PLEASE READ THIS SECTION BEFORE CONTINUING** To follow these instructions, you should be familiar with basic matrix theory and modular arithmetic. You will be expected to: Know common terms and definitions such as vector and transpose. Multiply matrices. Find the determinant of a matrix. Find the residue modulo 26 of entries in a vector. Perform elementary row operations in a matrix.
Background
Cryptography is the study of encoding and decoding secret messages. Substitution ciphers are among one of the first types of ciphers created. These ciphers replaced each letter of the alphabet by a different letter, as shown in Table 1.0. Table 1.0 Sample Substitution Cipher: Each Letter Shifts Right by One A B C D E F G H I J K J L K M L N O P O Q P R Q S R T S U T V U W V X Y Z Y
Z A B C D E F G H I
M N
W X
For instance, the word CODE becomes BNCD. Although this is a simple method of encryption, it has one significant flaw: the frequency of letters remains the same. For instance, the letter e is the most frequently used letter in the English language and makes up an average of 12.702% of all written correspondence [1]. In a substitution ciphertext, the letter or symbol that takes the place of e has the same frequency because it is merely a disguised representation of the letter. To avoid decryption, cryptographers began to apply once-abstract mathematics to cryptography. One of the most successful ciphers, designed by Lester S. Hill in the late 1920s, utilizes matrices and vectors to encode messages two letters at a time [2]. This instruction manual explains how to use Hills 2-cipher technique.
Enciphering a Message
1. Obtain a plaintext message to encode in standard English with no punctuation. In this example, we will encipher the message DR GREER ROCKS. 2. Create an enciphering matrix: 2.1. Form a square 2x2 matrix with nonnegative integers each less than 26.
1 2
2.2.
3 1
Check that its determinant does NOT factor by 2 or 13. If this is so, return to Step 2.1.
1 det 2
3 = (1 1) ( 3 2 ) = 5 1
3. Group the plaintext into pairs. If you have an odd number of letters, repeat the last letter. DR GR EE RR OC KS
4. Replace each letter by the number corresponding to its position in the alphabet i.e. A=1, B=2, C=3Z=0. See Table A below for quick reference. Table A Letters and Their Corresponding Positions A B C D E F G H I J K L M N O P Q R S T U V W X 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 D R 4 18 G R 7 18 EE R R O C K S
Y Z 25 0
5 5 18 18 15 3 11 19
5
5. Convert each pair of letters into plaintext vectors.
D 4 R 18
G 7 R 18
E 5 E 5
R 18 R 18
O 15 C 3
K 11 S 19
6. Convert the plaintext vectors into ciphertext vectors. 6.1. Mutiply the enciphering matrix by each plaintext vector.
D 1 R 2 R 1 R 2
6.2.
3 4 58 = 1 18 26 318 72 = 1 18 54
G 1 R 2 O 1 C 2
3 7 61 = 1 18 32 315 24 = 1 3 33
E 1 E 2 K 1 S 2
35 20 = 1 5 15 311 68 = 1 19 41
D 1 R 2 G 1 R 2 E 1 E 2 R 1 R 2 O 1 C 2 K 1 S 2
3 4 58 6 = = (mod 26) 1 18 26 0 3 7 61 9 = = (mod 26) 1 18 32 6 35 20 = 1 5 15 318 72 20 = = (mod 26) 1 18 54 2 315 24 24 = = (mod 26) 1 3 33 7 311 68 16 = = (mod 26) 1 19 41 15
7. Convert each entry in the ciphertext vector into its corresponding position in the alphabet.
6
D 1 R 2 G 1 R 2 E 1 E 2 R 1 R 2 O 1 C 2 K 1 S 2 3 4 58 6 F = = (mod 26) 118 26 0 Z 3 7 61 9 I = = (mod 26) 118 32 6 F 35 20 T = 1 5 15 O 318 72 20 T = = (mod 26) 118 54 2 B 315 24 24 X 3 = 33 = 7 (mod 26) G 1 311 68 16 P = = (mod 26) 119 41 15 O
8. Align the letters in a single line without spaces. The message is now enciphered.
FZIFTOTBXGPO
1 . 2
3. Replace each letter by the number corresponding to its position in the alphabet i.e. A=1, B=2, C=3Z=0. See Table A, repeated below, for quick reference. Table A Letters and Their Corresponding Positions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 S A K N O X 15 24 A 1 O 15 J X
19 1
11 14
10 24
S 19 A 1
K 11 N 14
O 15 X 24
A 1 O 15
J 10 X 24
8
5. Find the inverse of the enciphering matrix. 5.1. Find the determinant of the enciphering matrix.
4 det 3
5.2.
1 = ( 4 2 ) (1 3) = 5 2
Find the determinants reciprocal modulo 26. See Table B below for quick reference.
Reciprocal Modulo 26
4 det 3
5.3.
1 = ( 4 2 ) (1 3) = 5 51 ( mod 26) = 21 2
4 21 3
5.4.
1 42 = 2 63
21 84
Find the residue modulo 26 of the new matrix. This is the deciphering matrix.
4 21 3
1 42 = 2 63
21 16 = 84 15
5 ( mod 26 ) 6
9
6. Convert the ciphertext vectors into plaintext vectors. 6.1. Mutiply the deciphering matrix by each ciphertext vector.
K 16 N 15 J 16 X 15
6.2.
S 16 A 15 K 16 N 15 O 16 X 15 A 16 O 15
519 309 23 = = ( mod 26 ) 6 1 291 5 511 246 12 = = ( mod 26) 6 14 249 15 515 360 22 = = ( mod 26 ) 6 24 369 5 5 1 91 13 = = ( mod 26 ) 6 15 105 1
10
7. Convert each entry in the ciphertext vector into its corresponding position in the alphabet.
S 16 519 309 23 W = = ( mod 26) A 15 6 1 291 5 E K 16 511 246 12 L = = ( mod 26) N 15 614 249 15 O O 16 515 360 22 V = = ( mod 26 ) X 15 624 369 5 E A 16 5 1 91 13 M = = ( mod 26) O 15 615 105 1 A J 16 510 280 20 T = = ( mod 26) X 15 624 294 9 H
8. Align the letters in a single line without spaces.
WELOVEMATH
9. Use logic and phonetics to determine individual words. The message is now deciphered.
WE LOVE MATH
11
Ciphertext J 10 Y 25 Q 17 O 15 A 1
Plaintext T 20 O 15 M 13
Many letters and written correspondence begin with common words such as dear or hello or the
name of the intended recipient. Real ciphertext can be deciphered by making and using these assumptions.
12
3.2. Convert each pair of letters in the ciphertext and plaintext into vectors. Ciphertext Plaintext
J 10 Y 25 Q 17 O 15
A 1 T 20 O 15 M 13
3.3.
10 c1 = 25 17 c2 = 15
4. Group the ciphertext and plaintext vectors into 2x2 matrices. 4.1. Take the transpose of all vectors.
c1 = [10 25]
T T
c2 = [17 15]
p1 = [1 20]
T T
p2 = [15 13]
c1T C = T. c2
4.2.
C such that
c1T 10 25 C = T = c 2 17 15
4.3.
Create the 2x2 matrix
P such that
p1T P = T. p2
p1T 1 20 P= T = p 2 15 13
13
5. Solve for the deciphering matrix.
5.1.
Augment matrix
[C | P ] =
5.2.
Perform elementary row operations on [C | P ] to obtain the 2x2 identity matrix on the left side of the augmented matrix. The 2x2 matrix formed on the right side of the matrix is the deciphering matrix.
(1) (2)
10 17
25 15
1 15
20 13
[C | P ] .
27 17 1 (3) 17 1 0 1 (5) 0
(4) (6)
Add row 2 to row 1. Replace row 1 entries by their residues mod 26. Add -17 times the first row to the second. Replace row 2 entries by their residues mod 26. Multiply row 2 by 11-1 = 19. Replace row 2 entries by their residues mod 26. Add -14 times the second row to the first. Replace row 1 entries by their residues mod 26.
1 14 16 0 1 57 1 14 16 (7) 5 0 1 1 0 1 (9) 0
(8)
0 1 0 1
54 189 5 14 24 19 5 14
24
19 . 14
14
6. Group the whole ciphertext into pairs. LN GI HG YB VR EN JY QO
7. Replace each letter by the number corresponding to its position in the alphabet i.e. A=1, B=2, C=3, etc. See Table A, repeated below, for quick reference. Table A Letters and Their Corresponding Positions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 L N G I 7 9 HG 8 7 Y B V R E N 5 14 J Y Q O
12 14
25 2
22 18
10 25
17 15
L 12 N 14 V 22 R 18
G 7 I 9 E 5 N 14
H 8 G 7 J 10 Y 25
Y 25 B 2 Q 17 O 15
15
9. Follow Steps 6 through 9 under Deciphering a Message: Known Enciphering Matrix.
L 24 5 12 358 20 T = = ( mod 26) N 19 1414 424 8 H G 24 5 7 213 5 E = = ( mod 26) I 19 149 259 25 Y H 24 5 8 227 19 S = = ( mod 26) G 19 147 250 16 P Y 24 5 25 610 12 L = = ( mod 26 ) B 19 14 2 503 9 I V 24 5 22 618 20 T = = ( mod 26 ) R 19 1418 670 20 T E 24 5 5 190 8 H = = ( mod 26) N 19 1414 291 5 E J 24 5 10 365 1 A = = ( mod 26) Y 19 14 25 540 20 T Q 24 5 17 483 15 O = = ( mod 26 ) O 19 1415 533 13 M
THEYSPLITTHEATOM
The entire deciphered message is
16
Conclusion
The Hill 2-cipher is a great example of how mathematics can change the way we communicate. In fact, the Hill cipher can be modified to work for a variety of situations and codes. While the intricacies and proofs of the math are beyond the scope of this guide, here are a few suggestions for your own unique messages: Desired Action Include punctuation; Encrypt in other languages Calculation Changes Choose a new modulus equal to the total number of letters and symbols. Encrypt large amounts of text at once Instead of using a Hill 2cipher, use a Hill n-cipher and group according to n. Suggestions Choose the new modulus carefully. Prime mods work best because they form inverses more easily. Performing the Hill 3- or Hill 4-ciphers on paper can result in easy calculating errors. Always check your work with a calculator or Create a more secure message system overall N/A other tool. Combine mathematically complex ciphers with simple ciphers (i.e. Caesars cipher or the Freemason cipher).
17
Appendix
GLOSSARY Ciphers codes Ciphertext coded messages Cryptography the study of encoding and decoding secret messages Decipher to accurately extract written information from coded messages Encipher to effectively hide written information behind seemingly useless jargon Mod abbr. modulus Modular arithmetic the technique of working with remainders to secure a nonnegative integer between zero and positive integer m. Modulo 26 in modular arithmetic, this refers to the act of cycling a number through 26 different entities, which in this case represent letters. Plaintext uncoded messages Substitution ciphers the simplest ciphers, which replace each letter of the alphabet by a different letter
REFERENCES [1] D. Wright, Nineteenth Century: Statistics, [online document], 1999 Nov 19, [cited 2007 Oct 4], Available HTTP: http://www.math.okstate.edu/~wrightd/crypt/crypt-intro/node9.html [2] X. Yuan, Lecture 6: Classic Ciphers, [online document], Available HTTP: http://vanets.vuse.vanderbilt.edu/~xue/cs291fall06/lecture6.pdf