We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
Matrix Coding
Cryptography, to most people, is concerned with keeping communications private.
Indeed, the protection of sensitive communications has been the emphasis of
cryptography throughout much ofits history. Encryption is the transformation of data
into some unreadable form. Its purpose is to ensure privacy by keeping the information
hidden from anyone for whom it is not intended, even those who can see the encrypted
data, Decryption is the reverse of encryption; it is the transformation of encrypted data
back into some intelligible form,
Encryption and decryption require the use of some secret information, usually referred to
as a key. Depending on the encryption mechanism used, the same key might be used for
both encryption and decryption, while for other mechanisms, the keys used for
encryption and decryption are different.
Today governments use sophisticated methods of coding and decoding messages. One
type of code, which is extremely difficult to break, makes use ofa large matrix to encode a
message. The receiver of the message decodes it using the inverse of the matrix. This first
matrix i called the encoding matrix and its inverse is called the decoding matrix,
Example Let the message be:
PREPARE TO NEGOTIATE
and the encoding matrix be
[-3 -3 -4]
lo vt
434
We assign a number for each letter of the alphabet. For simplicity, let us associate each
letter with its position in the alphabet: A is 1, B is 2, and so on, Also, we assign the
number 27 (remember we have only 26 letters in the alphabet, please tell me you know
this) to a space between two words. Thus the message becomes:
PP a ee ea eee eae
1618 5 16 1 18 5 27 20 15 2714 5 7 15209 1 205
Since we are using a 3 by 3 matrix, we break the enumerated message above into a
sequence of 3 by 1 matrices:27] |27| |7 | Jo | |s
16] fis] [5] [15] fs] [20] [20
is} |
5 J [18] foo} faa] fis} [a J [27
Note that it was necessary to add a space at the end of the message to complete the last
ratrix. We now encode the message by multiplying each of the above matrices by the
encoding matrix. This can be done by writing the above matrices as columns of a matrix
and perform the matrix multiplication of that matrix with the encoding matrix as follows
[3-3-4] [16 16 5 15 5 20 20
jo 11 |ig1 272779 5
43 4 ][5 18 2014 151 27
which gives the matrix
(122 -123 -176 -182 -96 -91 ~ 183]
23 19 47 41 22 10 32
138 139 181 197 101 111 203
‘The columns of this matrix give the encoded message. The message is transmitted in the
following linear form
122, -123, +176, 182, -96, 91, -183, 23, 19, 47, 41,22, 10, 32, 138, 139, 181, 197, 101, 111, 203
To decode the message, the receiver writes this string as a sequence of 3 by 1 column
‘matrices and repeats the technique using the inverse of the encoding matrix. The inverse of
this encoding matrix, the decoding matri, is:
Bee
44 3
na -3 -3]
(make suze that you compute it yourself). Thus, to decode the message, perform the
‘matrix multiplication
flO 1) [122 -123 -176 ~182 -96 -91 ~183]
144 3i| 23 19 47 41 22 10 32
4-3 -3][ 138 139 181 197 101 111 203;and get the matrix
16 16 5 15 5 20 20
W811 272779 5
IS 18 2014 151 27
‘The columns of this matrix, written in linear form, give the original message:
PREPARE*TO*NEGOT
Sl 1
TAT E*
1618 5 16 1 18 5 27 20 15 2714 5 15209 1
20 5 27
And the net result, then, is that you should get ready to do some serious negotiating.
Now, in all honesty, nobody would use such a simple code to send important secret
messages like WE WILL BOMB HIROSHIMA ON AUGUST SIXTH, D DAY WILL
BE TOMORROW, or DISNEY WORLD IS THE PLACE TO BE THIS CHRISTMAS,
AND FRANKLY, AT ANY TIME OF ANY YEAR. People sending codes had much
‘more intricate ways of disguising what letters corresponded to what numbers when they
used matrices. However, since we are not taking a full class on cryptography, itis not
desperately important that we know how to do deeply difficult decoding. But let's look
at one simple way that could be used, Instead of having the following as our number to
letter set-up:
o>
B
2
wo
DEFGHIJ KL MNOPQRSTUVWXYZ*
4.567 8 9 10.11 12 13 14 15 16 17 18192021 2223 2425 2627
wwe could, instead, horizontally shift the letters five positions to the right and get this:
-<
WXYZABCDEFGHIJ K L MNOPQRSTU*
2.3 4567 8 9 10 1112131415 16 17 18192021 22232425 2627
We might shift letters to the left, or reverse them, or assign them numbers that start at 37
and increase by three every time, and so on and so forth. As long as the sender and the
receiver know the code that is being used and which number goes with which letter, then
all is well in Denmark. If they are not on the same page, then something is rotten in
Denmark, and a message will simply look like random letters and mean nothing to the
receiver.EXERCISES.
1. Shift the normal 26-letter alphabet five letters to the right in the next problem (it will look like
the above row of letters that assigns the letter to 1) to help you solve the following code:
180, 487, 279, 404, 282, 148, 494, 4, -104, -50, -18, 110, -20, -70, 263, 418, 272, $11, 131, 154, 512,
where the decoding matrix is
‘The actual message is:
2. To decode the next message, shift the normal 26-letter alphabet seven letters to the
right. Keep number 27 reserved for a space. The decoding matrix is
anes
15 15 33
ete are.
3°
ae
is “15 373
alae 0
5 3
‘The code is: 188, 177, 158, 139, 129, 235, 172, 214, 111, 180, 227, 134, 232, 113, 182, 171, 91, 175,
173, 156, 154, 145, 178, 201, 121, 40, 110, 108, 31, 72, 88, 74, 76, 54, 78, 107, 110, 47, 131, 133, 27,
78, 99, 66, 32, 82, 82
‘The actual message is:
3. Homework problem. Make up your own message to transmit, encode it, and bring it to
class tomorrow. In class, you will give the coded message to a partner as a string of
numbers for them to solve. You can use any variation of letter-to-number correspondence
you want, as well as any encoding matrix, but be sure to include both for your partner
before he or she tries to decode your message.