/*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} Problem 1 Obtain the Hill cipher of the me... [FREE SOLUTION] | 91Ó°ÊÓ

91Ó°ÊÓ

Obtain the Hill cipher of the message $$\text {DARK NIGHT}$$ for each of the following enciphering matrices: (a) \(\left[\begin{array}{ll}1 & 3 \\ 2 & 1\end{array}\right]\) (b) \(\left[\begin{array}{ll}4 & 3 \\ 1 & 2\end{array}\right]\)

Short Answer

Expert verified
For matrix (a), the enciphered message is "DG VSL IB TKJ". For matrix (b), it is "MD ULY DTG PN".

Step by step solution

01

Convert Message to Numerical Form

To encrypt using the Hill cipher, we first convert the message "DARK NIGHT" into numerical form. Each letter corresponds to its position in the alphabet (A=0, B=1,..., Z=25). D=3, A=0, R=17, K=10, N=13, I=8, G=6, H=7, T=19, so the message becomes the sequence [3, 0, 17, 10, 13, 8, 6, 7, 19].
02

Divide into Pairs for Matrix Multiplication

Since we are using 2x2 matrices, we divide the numerical sequence into pairs: (3,0), (17,10), (13,8), (6,7), (19). The last number, 19, is paired with a padding letter, typically 'X'=23, to complete the sequence. This gives us the pairs: (3,0), (17,10), (13,8), (6,7), (19,23).
03

Encipher Using Matrix A

Matrix (a) is \( \begin{bmatrix} 1 & 3 \ 2 & 1 \end{bmatrix} \). For each pair (x,y), we compute \( \begin{bmatrix} 1 & 3 \ 2 & 1 \end{bmatrix} \cdot \begin{bmatrix} x \ y \end{bmatrix} \) modulo 26.\- Pair (3,0): \( (1*3 + 3*0, 2*3 + 1*0) = (3,6) \Rightarrow (3,6) \).\- Pair (17,10): \( (1*17 + 3*10, 2*17 + 1*10) = (47,44) \equiv (21,18) \mod 26 \).\- Pair (13,8): \( (13+24, 26+8) = (37,34) \equiv (11,8) \mod 26 \).\- Pair (6,7): \( (6+21,12+7) = (27,19) \equiv (1,19) \mod 26 \).\- Pair (19,23): \( (19+69,38+23) = (88,61) \equiv (10,9) \mod 26 \).\So the encrypted sequence is [3, 6, 21, 18, 11, 8, 1, 19, 10, 9].
04

Convert Numerical Form to Letters for Matrix A

Convert the encoded numerical sequence back to letters: 3=D, 6=G, 21=V, 18=S, 11=L, 8=I, 1=B, 19=T, 10=K, 9=J. Therefore, the enciphered message for matrix A is "DG VSL IB TKJ".
05

Encipher Using Matrix B

Matrix (b) is \( \begin{bmatrix} 4 & 3 \ 1 & 2 \end{bmatrix} \). For each pair (x,y), we compute \( \begin{bmatrix} 4 & 3 \ 1 & 2 \end{bmatrix} \cdot \begin{bmatrix} x \ y \end{bmatrix} \) modulo 26.\- Pair (3,0): \( (4*3 + 3*0, 3+0) = (12,3) \equiv (12,3) \mod 26 \).\- Pair (17,10): \( (68+30, 17+20) = (98,37) \equiv (20,11) \mod 26 \).\- Pair (13,8): \( (52+24, 13+16) = (76,29) \equiv (24,3) \mod 26 \).\- Pair (6,7): \( (24+21,18+14) = (45,32) \equiv (19,6) \mod 26 \).\- Pair (19,23): \( (76+69,19+46) = (145,65) \equiv (15,13) \mod 26 \).\So the encrypted sequence is [12, 3, 20, 11, 24, 3, 19, 6, 15, 13].
06

Convert Numerical Form to Letters for Matrix B

Convert the encoded numerical sequence back to letters: 12=M, 3=D, 20=U, 11=L, 24=Y, 3=D, 19=T, 6=G, 15=P, 13=N. Therefore, the enciphered message for matrix B is "MD ULY DTG PN".

Unlock Step-by-Step Solutions & Ace Your Exams!

  • Full Textbook Solutions

    Get detailed explanations and key concepts

  • Unlimited Al creation

    Al flashcards, explanations, exams and more...

  • Ads-free access

    To over 500 millions flashcards

  • Money-back guarantee

    We refund you if you fail your exam.

Over 30 million students worldwide already upgrade their learning with 91Ó°ÊÓ!

Key Concepts

These are the key concepts you need to understand to accurately answer the question.

Enciphering Matrices
The heart of the Hill cipher involves enciphering matrices, which transform plaintext into ciphertext. An enciphering matrix is essentially a key that, when multiplied with a numerical form of your message, alters it in a way that makes the resulting sequence look nothing like the original. These matrices are usually square, meaning they have the same number of rows and columns, and are used to handle blocks of letters simultaneously.

For our exercise using the Hill cipher, we employ two 2x2 matrices, which suggests we will handle letters in pairs. When a message uses 2x2 matrices, each pair of letters from the plaintext are examined collectively, allowing for more complex and secure transformations compared to simpler substitution ciphers. The transformation relies heavily on being able to invert these matrices during the decryption process, which drills down into the importance of matrix operations in cryptography.
Modular Arithmetic
The concept of modular arithmetic is integral to ensuring our enciphered message remains within the bounds of the alphabet. In modular arithmetic, numbers wrap around after they reach a certain value, which is especially important in encoding and decoding messages.

In the context of the Hill cipher, our module is 26, representing the number of letters in the English alphabet. When individual letter values exceed 25 after matrix multiplication, modular arithmetic is applied to map these values back to a valid letter range. For instance, if a multiplication yields the number 27, it is equivalent to 1 in the mod 26 system, thus ensuring that every operation remains compatible within the confines of alphabetical encoding.
Matrix Multiplication
Matrix multiplication is the core operation used to transform our numerical sequences in the Hill cipher. This operation involves taking an enciphering matrix and multiplying it with pairs of numbers representing letters.

In a 2x2 matrix system, each pair of numbers from the message is represented as a column vector, and each element of the resulting vector is found by taking the dot product of the rows of the enciphering matrix with the message vector. These computations often result in numbers outside the typical character range, necessitating the use of modular arithmetic to convert back to a valid state.

For example, with our enciphering matrix \([ a \ b \ c \ d ]\), a pair \(( x, y )\) is transformed by calculating new values as \(( ax + by, cx + dy )\), which are then reduced under mod 26 to stay within the alphabet.
Numerical Form Conversion
Converting letters to numerical form is the first step in applying any mathematical transformation via processes like the Hill cipher. Each letter in the alphabet is assigned a unique number starting from A=0 to Z=25, creating a straightforward way to encode text into a format suitable for mathematical operations.

In our exercise, the message "DARK NIGHT" is converted to a sequence of numbers: D=3, A=0, R=17, K=10, N=13, I=8, G=6, H=7, T=19. These numbers are then grouped according to the size of the enciphering matrix, here in pairs due to our use of 2x2 matrices.
  • Pairing ensures compatibility with matrix dimensions and facilitates sequence transformations during encryption.
  • Padding with a dummy letter, typically 'X'=23, is necessary for uneven sequences, maintaining the matrix form needed for cryptographic operations.
This step-by-step process is critical for setting up the initial conditions of encryption and ensures the message is mathematically optimized for encipherment.

One App. One Place for Learning.

All the tools & learning materials you need for study success - in one app.

Get started for free

Most popular questions from this chapter

Decode the following Hill 3-cipher if the first nine plaintext letters are IHAVECOME: HPAFQGGDUGDDHPGODYNOR

In a journal article [F.J. Dyson and H. Falk, "Period of a Discrete Cat Mapping." The American Mathematical Monthly, (August-September 1992), pp. 603-614] the following results concerning the nature of the function \(\Pi(p)\) were established: (i) \(\quad \Pi(p)=3 p\) if and only if \(p=2 \cdot 5^{k}\) for \(k=1,2, \ldots\) (ii) \(\Pi(p)=2 p\) if and only if \(p=5^{k}\) for \(k=1,2, \ldots\) or \(p=6 \cdot 5^{k}\) for \(k=0,1,2, \ldots\) (iii) \(\Pi(p) \leq 12 p / 7\) for all other choices of \(p\) Find \(\Pi(250), \Pi(25), \Pi(125), \Pi(30), \Pi(10), \Pi(50), \Pi(3750), \Pi(6),\) and \(\Pi(5)\)

(a) Show that the positive eigenvalue \(\lambda_{1}\) of a Leslie matrix is always simple. Recall that a root \(\lambda_{0}\) of a polynomial \(q(\lambda)\) is simple if and only if \(q^{\prime}\left(\lambda_{0}\right) \neq 0\) (b) Show that the eigenspace corresponding to \(\lambda_{1}\) has dimension 1.

The following five points $$(0,1),(1,7),(2,27),(3,79),(4,181)$$ lie on a single cubic curve. (a) Which of the three types of cubic splines (natural, parabolic runout, or cubic runout) would agree exactly with the single cubic curve on which the five points lie? (b) Determine the cubic spline you chose in part (a), and verify that it is a single cubic curve that interpolates the five points.

A well-known method of generating a sequence of "pseudorandom" integers \(x_{0}, x_{1}, x_{2}, x_{3}, \ldots\) in the interval from 0 to \(p-1\) is based on the following algorithm: (i) Pick any two integers \(x_{0}\) and \(x_{1}\) from the range \(0,1,2, \ldots, p-1\) (ii) Set \(x_{n+1}=\left(x_{n}+x_{n-1}\right)\) mod \(p\) for \(n=1,2, \ldots\) Here \(x\) mod \(p\) denotes the number in the interval from 0 to \(p-1\) that differs from \(x\) by a multiple of \(p .\) For example, 35 mod \(9=8 \text { (because } 8=35-3 \cdot 9) ; 36 \bmod 9=0 \text { (because } 0=36-4 \cdot 9) ; \text { and }-3 \bmod 9=6 \text { (because } 6=-3+1 \cdot 9)\) (a) Generate the sequence of pseudorandom numbers that results from the choices \(p=15, x_{0}=3,\) and \(x_{1}=7\) until the sequence starts repeating. (b) Show that the following formula is equivalent to step (ii) of the algorithm: $$ \left[\begin{array}{l} x_{n+1} \\ x_{n+2} \end{array}\right]=\left[\begin{array}{cc} 1 & 1 \\ 1 & 2 \end{array}\right]\left[\begin{array}{c} x_{n-1} \\ x_{n} \end{array}\right] \bmod p \text { for } n=1,2,3, \ldots $$ (c) Use the formula in part (b) to generate the sequence of vectors for the choices \(p=21, x_{0}=5,\) and \(x_{1}=5\) until the sequence starts repeating.

See all solutions

Recommended explanations on Math Textbooks

View all explanations

What do you think about this solution?

We value your feedback to improve our textbook solutions.

Study anywhere. Anytime. Across all devices.