Cryptography Reference
In-Depth Information
modulo n (see Definition A.20 in Appendix A on page 477). Then for m
M
,
e
K
, c
C
, the enciphering transformation is given by
E e ( m )= me = c,
and the deciphering transformation is given by
D d ( c )= cd = ce 1 .
Note that
e is invertible, namely, d = e 1 exists if and only if gcd(det( e ) ,n )=1 .
(See Appendix A, page 493.)
The above definition tells us that changing one character of plaintext will
usually change r letters of ciphertext. Hence, frequency analysis of ciphertext
is less effective, especially for large r . However, the Hill cipher succumbs to
known plaintext attacks (see Footnote 2.9 on page 84). Now we illustrate it
with a simple example, which is intended for the uninitiated reader. Merely
revisit pages 491-493 in Appendix A to see the simple methods for two-by-two
matrices illustrated there.
Example 3.2 Let n =26 and r =2 ,so
) 2 ,
A
=
Z
/ 26
Z
,
M
=
C
=(
Z
/ 26
Z
and
K
consists of invertible 2
×
2 matrices with entries from
Z
/ 26
Z
. Thus, if
e
, then gcd(det( e ) , 26) = 1 ( see part (b) of Theorem A.25 on page 493) .
For instance, take
K
e = 25
34
for which det( e )=
7 . Suppose that we want to encipher the plaintext:
message by matrix .
First we get the numerical equivalents from Table 1.3 on page 11:
12 , 4 , 18 , 18 , 0 , 6 , 4 , 1 , 24 , 12 , 0 , 19 , 17 , 8 , 23 .
(3.1)
Thus, we may set
m 1 = (12 , 4) , m 2 = (18 , 18) , m 3 =(0 , 6) , m 4 =(4 , 1) , m 5 = (24 , 12) ,
m 6 =(0 , 19) , m 7 = (17 , 8) , and m 8 = (23 , 25) ,
where we have used a “z” with numerical value 25 to make up the last ordered
pair m 8 . Now use the enciphering transformation defined in the Hill Cipher.
( Remember that once we get the entries in the final ciphertext matrix, we have
Search WWH ::




Custom Search