(New page: == Application of Linearity == === 1. How Can Bob Decrypt the Message? === Alice makes sure the first thing that she does is tell Bob what secret matrix she is going to use. This is crit...)
 
 
(8 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
=== 1. How Can Bob Decrypt the Message? ===
 
=== 1. How Can Bob Decrypt the Message? ===
 
Alice makes sure the first thing that she does is tell Bob what secret matrix she is going to use.  This is critical since this matrix is the basis of the encrypted message.  Alice then replaces each letter by its corresponding order in the alphabet and puts a zero for a space.  Using this integer vector, she applies the secret matrix three entries at a time which yields a new integer vector.  She then sends this new vector to Bob.  Bob is easily able to decode this message.  In order to do this, Bob first has to find the inverse of the secret matrix.  Then he applies the inverse secret message to the encrypted vector 3 integers at a time.  This produces an integer vector in which each number corresponds to the order of that letter in the alphabet.  Bob can find the message by replacing each number with the corresponding letter in the alphabet, and if he encounters a 0, he simply needs to insert a space.
 
Alice makes sure the first thing that she does is tell Bob what secret matrix she is going to use.  This is critical since this matrix is the basis of the encrypted message.  Alice then replaces each letter by its corresponding order in the alphabet and puts a zero for a space.  Using this integer vector, she applies the secret matrix three entries at a time which yields a new integer vector.  She then sends this new vector to Bob.  Bob is easily able to decode this message.  In order to do this, Bob first has to find the inverse of the secret matrix.  Then he applies the inverse secret message to the encrypted vector 3 integers at a time.  This produces an integer vector in which each number corresponds to the order of that letter in the alphabet.  Bob can find the message by replacing each number with the corresponding letter in the alphabet, and if he encounters a 0, he simply needs to insert a space.
 +
 +
=== 2. Can Eve Decrypt the Message Without Finding the Inverse of the Secret Matrix? ===
 +
It is possible for Eve to decrypt the message.  Assume M=message vector, E=encrypted vector, and S=secret matrix.  The vectors and matrix are related in this way:
 +
 +
 
 +
:<center><math> M*S=E\!</math></center>
 +
 +
So Eve can then find the Secret Matrix using the equation,
 +
 +
:<center><math> M=E*S^{-1}\!</math></center>
 +
 +
Now that she knows the secret matrix, it is a simple matter of finding the inverse secret matrix and applying it to the encrypted vector to find the message.  Using MATLAB (and with coding help from Ronny Wijaya), the secret matrix is,
 +
 +
:<center><math>\begin{matrix} - \frac{2}{3} & 0 & \frac{2}{3} \\ 0 & 1 & 0 \\ 4 &0 & -1 \end{matrix} </math></center>
 +
 +
=== 3. What is the Decrypted Message Corresponding to (2,23,3)? ===
 +
As described in part 1, we can use the inverse secret matrix to find the decrypted message.
 +
 +
:<center><math>(2,23,3)*inverse secret matrix=decrypted message\!</math></center>
 +
 +
 +
Using the given vector (2,23,3) and the inverse of the secret matrix, we can plug these values into MATLAB to find that the decrypted vector is (2,23,5).
 +
 +
The message corresponding to (2,23,5) is BWE.

Latest revision as of 12:19, 16 September 2008

Application of Linearity

1. How Can Bob Decrypt the Message?

Alice makes sure the first thing that she does is tell Bob what secret matrix she is going to use. This is critical since this matrix is the basis of the encrypted message. Alice then replaces each letter by its corresponding order in the alphabet and puts a zero for a space. Using this integer vector, she applies the secret matrix three entries at a time which yields a new integer vector. She then sends this new vector to Bob. Bob is easily able to decode this message. In order to do this, Bob first has to find the inverse of the secret matrix. Then he applies the inverse secret message to the encrypted vector 3 integers at a time. This produces an integer vector in which each number corresponds to the order of that letter in the alphabet. Bob can find the message by replacing each number with the corresponding letter in the alphabet, and if he encounters a 0, he simply needs to insert a space.

2. Can Eve Decrypt the Message Without Finding the Inverse of the Secret Matrix?

It is possible for Eve to decrypt the message. Assume M=message vector, E=encrypted vector, and S=secret matrix. The vectors and matrix are related in this way:


$ M*S=E\! $

So Eve can then find the Secret Matrix using the equation,

$ M=E*S^{-1}\! $

Now that she knows the secret matrix, it is a simple matter of finding the inverse secret matrix and applying it to the encrypted vector to find the message. Using MATLAB (and with coding help from Ronny Wijaya), the secret matrix is,

$ \begin{matrix} - \frac{2}{3} & 0 & \frac{2}{3} \\ 0 & 1 & 0 \\ 4 &0 & -1 \end{matrix} $

3. What is the Decrypted Message Corresponding to (2,23,3)?

As described in part 1, we can use the inverse secret matrix to find the decrypted message.

$ (2,23,3)*inverse secret matrix=decrypted message\! $


Using the given vector (2,23,3) and the inverse of the secret matrix, we can plug these values into MATLAB to find that the decrypted vector is (2,23,5).

The message corresponding to (2,23,5) is BWE.

Alumni Liaison

Basic linear algebra uncovers and clarifies very important geometry and algebra.

Dr. Paul Garrett