Cryptography Keeping private Communication ENCRYPTION and DECRYPTION
Sender Plain text Cyper text ENCRYPTION Receiver Cyper text DECRYPTION Plain text
USE OF MATRIX Plain text Cyper text Jack MATRIX Cyper text Jill INVERSE OF MATRIX Plain text
1. Convert the message in to numbers. Ex: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 A B C D E F G H I J K L M N O P Q R S T U V 23 24 25 26 W X Y Z 2. Build the numbers in to Matrix. 3. Multiplying the matrix with our choice matrix. 4. We get a new matrix. 5. Convert the matrix in to string= cyber text encoded message. RULES FOR ENCODING
RULES FOR DECODING Convert the encoded message into matrix. Multiplying the above matrix with the inverse of our choice matrix. We get another(plain text) matrix. Convert Matrix into message(original message)
Plain text Encoding Cyper text Using matrix A Decoding Using the matrix A -1 Plain text
EXAMPLE: Message to be Sent ATTACK NOW Plain text Encoding A = 1 2 1 3 AT=[1 20] 1 2 = [21 62] 1 3 TA=[20 1] 1 2 = [21 43] 1 3