matrix app

Upload: nitinbala

Post on 08-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 matrix app

    1/25

    APPLICATION

    OF

    MATRICES

  • 8/7/2019 matrix app

    2/25

    WHAT IS A MATRIX?

    In mathematics, a matrix (pluralmatrices, orlesscommonlymatrixes) is a rectangulararray ofnumbers,such as

    An item in a matrix is called an entry oran element.

    Matrices of the same size can be added and subtractedentrywise and matrices of compatible sizes can bemultiplied. These operations have many of theproperties of ordinary arithmetic, except that matrixmultiplication is not commutative, that is, AB and BA

    are not equal in general. Matrices consisting of only onecolumn orrow define the components ofvectors, whilehigher-dimensional(e.g., three-dimensional) arrays ofnumbers define the components of a generalization of avectorcalled a tensor.

  • 8/7/2019 matrix app

    3/25

    Applications of matricesFIELD OF APPLICATION OFMATRICES USAGE

    COMPUTER DATA ENCRYPTION

    ECONOMICS & COMMERCE CALCULATION OF GDP etc.

    POLITICS CASTING POLLS

    ENGINEERING MATH REPORT RECORDING

    ARCHITECTURE USED ALONG WITH COMPUTING

    SCIENTIFIC STUDY MAKING OF GRAPHS AND STATISTICS

  • 8/7/2019 matrix app

    4/25

    Applications of matrices

    In

    CRYPTOGRAPHY

  • 8/7/2019 matrix app

    5/25

    What is Cryptography?

    Cryptography, to most people, is concernedwith keeping communications private.

    Encryption is the transformation of data intosome unreadable form. Its purpose is toensure privacy by keeping the informationhidden from anyone for whom it is notintended, even those who can see the

    encrypted data. Decryption is the reverse of encryption; it is

    the transformation of encrypted data backinto some intelligible form.

  • 8/7/2019 matrix app

    6/25

    Why Cryptography? Cryptography involves encrypting data so that

    a third party can not intercept and read the

    data.

    In the early days of satellite television, the

    video signals weren't encrypted and anyonewith a satellite dish could watch whatever was

    being shown.

    This was a problem so data must be somehowhidden for this cryptography is used

  • 8/7/2019 matrix app

    7/25

    PROCESS OF ENCRYPTION:

  • 8/7/2019 matrix app

    8/25

    CRYPTOGRAPHY

    SECRET EY

    SYMMETRIC

    ASYMMETRIC

    PUBLIC EY OPEN ACCESS

  • 8/7/2019 matrix app

    9/25

    How does Encryption takes place?

    Encryption Process:

    Convert the text of the message into a stream

    of numerical values. Place the data into a matrix.

    Multiply the data by the encoding matrix.

    Convert the matrix into a stream of numericalvalues that contains the encrypted message.

    STEPS FOR

    ENCRYPTION

  • 8/7/2019 matrix app

    10/25

    Consider the message PREPARE TO

    NEGOTIATE"

    A message is converted into numeric formaccording to some scheme. The easiest

    scheme is to let space=0, A=1, B=2, ..., Y=25,

    and Z=26. For example, the message "Red

    Rum" would become 18, 5, 4, 0, 18, 21, 13.

    STEP 1 :

  • 8/7/2019 matrix app

    11/25

    STEP 2:the encoding matrix be

    We assign a number for each letter of thealphabet.

    For simplicity, let us associate each letter with itsposition in the alphabet: A is 1, B is 2, and so on.

    Also, we assign the number 27 (remember wehave only 26 letters in the alphabet) to a spacebetween two words. Thus the message becomes

  • 8/7/2019 matrix app

    12/25

    STEP 3

    Since we are using a 3 by 3 matrix, we break the

    enumerated message above into a sequence of 3 by 1

    vectors:

  • 8/7/2019 matrix app

    13/25

    STEP 4:

    Note that it was necessary to add a space at

    the end of the message to complete the last

    vector. We now encode the message by

    multiplying each of the above vectors by the

    encoding matrix. This can be done by writing

    the above vectors as columns of a matrix and

    perform the matrix multiplication of thatmatrix with the encoding matrix as follows:

  • 8/7/2019 matrix app

    14/25

    which gives the matrix

  • 8/7/2019 matrix app

    15/25

    STEP 5:

    The columns of this matrix give the encoded

    message. The message is transmitted in the

    following linear form

  • 8/7/2019 matrix app

    16/25

    STEP 6 (DECODING):

    To decode the message, the receiver writes thisstring as a sequence of 3 by 1 column matricesand repeats the technique using the inverse of

    the encoding matrix.The inverse of this encoding matrix, the decoding

    matrix, is:

  • 8/7/2019 matrix app

    17/25

    Thus, to decode the message, perform the

    matrix multiplication

    and get the matrix

  • 8/7/2019 matrix app

    18/25

    CONCLUDING STEP

    The columns of this matrix, written in linear

    form, give the original message

  • 8/7/2019 matrix app

    19/25

  • 8/7/2019 matrix app

    20/25

    FIBONACCI CRYPTOGRAPHY The general idea of the Fibonacci

    cryptography is similar to the Fibonacci codingand based on the application of the

    generalized Fibonacci matrices, the Qp-

    matrices, for encryption and decryption of the

    initial messageM.

    Note that the encryption/decryption key is the pair of the numbers

    ofp and n. Since p = 0, 1, 2, 3, ... and n = 1, 2, 3, ... this means that

    this method has theoretically unlimited number of the

    encryption/decryption keys.

  • 8/7/2019 matrix app

    21/25

    STEP 1:

    Let's consider the Fibonacci encryption

    method:

    and then the Fibonacci decryption method

    It follows from (1) and (2) that the Fibonacci encryption algorithm

    (1) is reduced to the

    n-

    multiple multiplication of the initial matrix Mby the matrix Qpand the Fibonacci decryption algorithm is reduced to the n-

    multiple multiplication of the secret message Eby the inverse

    matrix .

  • 8/7/2019 matrix app

    22/25

    STEP 2: Let's consider now the multiplication of the

    initial matrixM by the matrix Qp

    . Let'sconsider the concrete example when theinitial message is represented in the form ofthe 4 X4 matrix:

    For this case the Qp-matrix of the 4-d order (p +

    1 = 4) is used for encryption:.1

  • 8/7/2019 matrix app

    23/25

    STEP 3: For calculation of the matrix ofE=M Q3 we

    can represent it in the following form:

    After the execution of the matrix multiplication (5) the matrix E

    takes the following form:

    .6

  • 8/7/2019 matrix app

    24/25

    CONCLUDING STEP

    Comparing the initial matrix (3) with its secret equivalent(6) we can formulate the following rule concerning themultiplication of the initial matrix M by the coding Qp-mat.

    RULE:

    For the multiplication of the initial matrix (6) by the inversematrix it is necessary to shift all the matrix entries of theinitial matrix (6) to the left by one column, and form thelast entries of each row by means of the subtraction of thesecond entry of each row of the initial matrix from its first

    entry.

    Det E= Det M X (-1)pn. (9)

  • 8/7/2019 matrix app

    25/25

    CONCLUSION

    THUS IN THIS WAY DATA CAN BE MADE SAFEAND MORE PROTECTED FROM THE VARIOUSHACKING DEVICES