06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.2. HILL CIPHERS 171<br />

th 2.96 es 1.34 at 1.16<br />

in 1.88 on 1.31 ed 1.14<br />

er 1.75 st 1.24 ti 1.10<br />

an 1.56 nt 1.21 nd 1.07<br />

re 1.45 en 1.20 to 1.04<br />

Figure 9.3: 18 Most Frequent Bigrams, in percent<br />

Monthly, the undergraduate journal <strong>of</strong> the American Mathematical Society. He<br />

eventually received U.S. patent 1,845,947 for an apparatus that mechanically<br />

performed his cipher. Much <strong>of</strong> Hill’s work involved the use <strong>of</strong> mathematics<br />

in communications, for example, methods for splicing telephone cables. His<br />

cipher provides us with an easy example <strong>of</strong> a polygraphic cipher, but is more<br />

important because it shows that by the middle <strong>of</strong> the first half <strong>of</strong> the 20th<br />

century cryptology was being done primarily by mathematicians.<br />

To explain the cipher we need to introduce matrices (plural <strong>of</strong> matrix).<br />

Matrices are simply rectangular arrays <strong>of</strong> numbers and are quite important<br />

in mathematics, chemistry ( ) and physics. We will deal only with two-by-two<br />

3 0<br />

matrices, such as . Matrices are very easy to add and subtract –<br />

−1 4<br />

simply perform the operation entry-by-entry. For example<br />

( ) 4 3<br />

+<br />

−2 7<br />

( ) 0 5<br />

=<br />

2 4<br />

( ) 4 8<br />

0 11<br />

and<br />

( ) 1 9<br />

−<br />

0 2<br />

( ) −2 3<br />

=<br />

5 1<br />

( ) 3 6<br />

.<br />

−5 1<br />

Multiplication is a bit more complicated as each row <strong>of</strong> the first matrix is<br />

multiplied by the column entries in the second. (Rows go across and columns<br />

go down.) For example,<br />

( ) ( ( ) ( )<br />

3 5 2 3 × 2 + 5 × 9 6 + 45<br />

× =<br />

=<br />

=<br />

14 23 9)<br />

14 × 2 + 23 × 9 28 + 209<br />

( )<br />

51<br />

,<br />

235<br />

and<br />

( ) 3 5<br />

×<br />

14 23<br />

( ) ( ) ( )<br />

15 3 × 15 + 5 × 19 45 + 95<br />

=<br />

=<br />

=<br />

19 14 × 15 + 23 × 19 210 + 437<br />

( ) a b<br />

The general form for multiplication is<br />

c d<br />

( e<br />

× =<br />

f)<br />

( ) 140<br />

.<br />

647<br />

( )<br />

a × e + b × f<br />

.<br />

c × e + d × f

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!