Compute A² and hence determine A-¹. Demonstrate this cryptography scheme using the secret key A by: Create the plaintext vector p for the message sus Encrypt the plaintext vector to form the ciphertext vector e Decrypt the ciphertext vector to obtain the vector d'and validate that d = p

Advanced Engineering Mathematics
10th Edition
ISBN:9780470458365
Author:Erwin Kreyszig
Publisher:Erwin Kreyszig
Chapter2: Second-order Linear Odes
Section: Chapter Questions
Problem 1RQ
icon
Related questions
Question
In this question, we will use the following cryptography scheme:
1. An invertible matrix M will be used as the secret key shared between between the Alice
and Bob.
2. Alice creates plaintext vector p by assigning each letter in the alphabet a numerical value.
In this case, we use a →1,b2,...,2 → 26. For example, the phrase 'red' will translate
into p= (1854)
3. The ciphertext vector is creating by encrypting the plaintext vector via c = Mp.
4. The ciphertext vector is sent to Bob via a communication channel.
=
5. Upon receiving the ciphertext, Bob decrypts to obtained the decipheredtext d via d =
M-¹c. If d = p, then Bob can decode the numerical vector to recover the initial message.
For Parts (a), (b), (c), we will use the secret key A
=
3 2 0
-4 -3 0
00 -1
Transcribed Image Text:In this question, we will use the following cryptography scheme: 1. An invertible matrix M will be used as the secret key shared between between the Alice and Bob. 2. Alice creates plaintext vector p by assigning each letter in the alphabet a numerical value. In this case, we use a →1,b2,...,2 → 26. For example, the phrase 'red' will translate into p= (1854) 3. The ciphertext vector is creating by encrypting the plaintext vector via c = Mp. 4. The ciphertext vector is sent to Bob via a communication channel. = 5. Upon receiving the ciphertext, Bob decrypts to obtained the decipheredtext d via d = M-¹c. If d = p, then Bob can decode the numerical vector to recover the initial message. For Parts (a), (b), (c), we will use the secret key A = 3 2 0 -4 -3 0 00 -1
(a) Compute A² and hence determine A-¹.
(b) Demonstrate this cryptography scheme using the secret key A by:
• Create the plaintext vector p for the message sus
Encrypt the plaintext vector to form the ciphertext vector
• Decrypt the ciphertext vector to obtain the vector d and validate that d = p
Transcribed Image Text:(a) Compute A² and hence determine A-¹. (b) Demonstrate this cryptography scheme using the secret key A by: • Create the plaintext vector p for the message sus Encrypt the plaintext vector to form the ciphertext vector • Decrypt the ciphertext vector to obtain the vector d and validate that d = p
Expert Solution
steps

Step by step

Solved in 5 steps

Blurred answer
Recommended textbooks for you
Advanced Engineering Mathematics
Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated
Numerical Methods for Engineers
Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education
Introductory Mathematics for Engineering Applicat…
Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY
Mathematics For Machine Technology
Mathematics For Machine Technology
Advanced Math
ISBN:
9781337798310
Author:
Peterson, John.
Publisher:
Cengage Learning,
Basic Technical Mathematics
Basic Technical Mathematics
Advanced Math
ISBN:
9780134437705
Author:
Washington
Publisher:
PEARSON
Topology
Topology
Advanced Math
ISBN:
9780134689517
Author:
Munkres, James R.
Publisher:
Pearson,