/* Author: Pate Williams (c) 1997 Exercise 1.4 "Suppose we are told that the plaintext conversation yields the ciphertext hiarrtnuytus where the Hill Cipher is used (but m is not specified). Determine the encryption matrix." -Douglas R. Stinson- See "Cryptography: Theory and Practice" by Douglas R. Stinson page 41. This is for m = 2, I had to change the ciphertext to "YUDOALQSRHYB". */ #include #include #include long **create_square_matrix(long n) { long i, **matrix = calloc(n, sizeof(long *)); if (!matrix) { fprintf(stderr, "fatal error\ninsufficient memory\n"); fprintf(stderr, "from create_matrix\n"); exit(1); } for (i = 0; i < n; i++) { matrix[i] = calloc(n, sizeof(long)); if (!matrix[i]) { fprintf(stderr, "fatal error\ninsufficient memory\n"); fprintf(stderr, "from create_matrix\n"); exit(1); } } return matrix; } void delete_square_matrix(long n, long **matrix) { long i; for (i = 0; i < n; i++) free(matrix[i]); free(matrix); } void Euclid_extended(long a, long b, long *u, long *v, long *d) { long q, t1, t3, v1, v3; *u = 1, *d = a; if (b == 0) { *v = 0; return; } v1 = 0, v3 = b; #ifdef DEBUG printf("----------------------------------\n"); printf(" q t3 *u *d t1 v1 v3\n"); printf("----------------------------------\n"); #endif while (v3 != 0) { q = *d / v3; t3 = *d - q * v3; t1 = *u - q * v1; *u = v1, *d = v3; #ifdef DEBUG printf("%4ld %4ld %4ld ", q, t3, *u); printf("%4ld %4ld %4ld %4ld\n", *d, t1, v1, v3); #endif v1 = t1, v3 = t3; } *v = (*d - a * *u) / b; #ifdef DEBUG printf("----------------------------------\n"); #endif } long inv(long number, long modulus) { long d, u, v; Euclid_extended(number, modulus, &u, &v, &d); if (d == 1) return u; return 0; } void gaussian_elimination(long n, long p, long *b, long *x, long **m) { int found; long *d = calloc(n, sizeof(long)), ck, dj; long i, j, k, l, sum, t; if (!d) { fprintf(stderr, "fatal error\ninsufficient memory\n"); fprintf(stderr, "from gaussian_elimination\n"); exit(1); } for (j = 0; j < n; j++) { found = 0, i = j; while (!found && i < n) { found = m[i][j] != 0 && inv(m[i][j], p) != 0; if (!found) i++; } if (!found) { fprintf(stderr, "fatal error\nnon-invertible matrix\n"); fprintf(stderr, "from gaussian_elimination\n"); fprintf(stderr, "j = %ld\n", j); for (k = 0; k < n; k++) { for (l = 0; l < n; l++) printf("%2ld ", m[k][l]); printf("\n"); } exit(1); } if (i > j) { /* swap elements */ for (l = j; l < n; l++) t = m[i][l], m[i][l] = m[j][l], m[j][l] = t; t = b[i], b[i] = b[j], b[j] = t; } dj = d[j] = inv(m[j][j], p); if (dj == 0) { fprintf(stderr, "fatal error\nnon-invertible element\n"); fprintf(stderr, "from gaussian elimination\n"); fprintf(stderr, "element %ld mod %ld\n", m[j][j], p); exit(1); } for (k = j + 1; k < n; k++) { ck = (dj * m[k][j]) % p; for (l = j + 1; l < n; l++) { m[k][l] = (m[k][l] - ck * m[j][l]) % p; if (m[k][l] < 0) m[k][l] += p; } b[k] = (b[k] - ck * b[j]) % p; if (b[k] < 0) b[k] += p; } } for (i = n - 1; i >= 0; i--) { sum = 0; for (j = i + 1; j < n; j++) sum += (m[i][j] * x[j]) % p; if (sum < 0) sum += p; x[i] = (d[i] * (b[i] - sum)) % p; if (x[i] < 0) x[i] += p; } } void inverse(long n, long p, long **m, long **X) { int found; long d, i, j, k, l, sum, temp; long **B = create_square_matrix(n); long *c = calloc(n, sizeof(long)); if (!c) { fprintf(stderr, "fatal error\ninsufficient memory\n"); fprintf(stderr, "from inverse\n"); exit(1); } for (i = 0; i < n; i++) B[i][i] = 1; for (j = 0; j < n; j++) { found = 0; for (i = j; i < n && !found;) { found = m[i][j] != 0 && inv(m[i][j], p) != 0; if (!found) i++; } if (!found) { fprintf(stderr, "fatal error\nnon-invertible matrix\n"); fprintf(stderr, "from inverse\n", j); exit(1); } if (i > j) { for (l = j; l < n; l++) { temp = m[i][l]; m[i][l] = m[j][l]; m[j][l] = temp; } for (l = 0; l < n; l++) { temp = B[i][l]; B[i][l] = B[j][l]; B[j][l] = temp; } } d = inv(m[j][j], p); for (k = j + 1; k < n; k++) c[k] = (d * m[k][j]) % p; for (k = j + 1; k < n; k++) { for (l = j + 1; l < n; l++) { m[k][l] -= (c[k] * m[j][l]) % p; m[k][l] %= p; if (m[k][l] < 0) m[k][l] += p; } } for (k = j + 1; k < n; k++) { for (l = 0; l < n; l++) { B[k][l] -= (c[k] * B[j][l]) % p; B[k][l] %= p; if (B[k][l] < 0) B[k][l] += p; } } } for (i = n - 1; i >= 0; i--) { for (j = 0; j < n; j++) { sum = 0; for (k = i + 1; k < n; k++) sum += m[i][k] * X[k][j]; X[i][j] = inv(m[i][i], p) * (B[i][j] - sum); X[i][j] %= p; if (X[i][j] < 0) X[i][j] += p; } } delete_square_matrix(n, B); free(c); } int main(void) { char ciphertext[16] = "YUDOALQSRHYB"; char plaintext[16] = "CONVERSATION"; long i, j, n = 4, p = 26, b[4], x[4]; long length = strlen(plaintext); long **K = create_square_matrix(n); long **k = create_square_matrix(n); printf("plaintext: %s\n", plaintext); printf("ciphertext: %s\n", ciphertext); for (i = 0; i < length; i++) { plaintext[i] -= (char) 'A'; ciphertext[i] -= (char) 'A'; } K[0][0] = plaintext[4]; K[0][2] = plaintext[5]; K[1][1] = plaintext[4]; K[1][3] = plaintext[5]; K[2][0] = plaintext[8]; K[2][2] = plaintext[9]; K[3][1] = plaintext[8]; K[3][3] = plaintext[9]; b[0] = ciphertext[4]; b[1] = ciphertext[5]; b[2] = ciphertext[8]; b[3] = ciphertext[9]; gaussian_elimination(n, p, b, x, K); K[0][0] = x[0]; K[0][1] = x[1]; K[1][0] = x[2]; K[1][1] = x[3]; printf("the key matrix is:\n"); for (i = 0; i < 2; i++) { for (j = 0; j < 2; j++) printf("%2ld ", K[i][j]); printf("\n"); } for (i = 0; i < length / 2; i++) { b[0] = K[0][0] * plaintext[2 * i] + K[1][0] * plaintext[2 * i + 1]; b[1] = K[0][1] * plaintext[2 * i] + K[1][1] * plaintext[2 * i + 1]; b[0] = b[0] % p; b[1] = b[1] % p; if (b[0] != ciphertext[2 * i] || b[1] != ciphertext[2 * i + 1]) printf("i = %ld no solution for m = 2\n", i); } inverse(2, p, K, k); printf("the inverse key matrix is:\n"); for (i = 0; i < 2; i++) { for (j = 0; j < 2; j++) printf("%2ld ", k[i][j]); printf("\n"); } delete_square_matrix(n, k); delete_square_matrix(n, K); return 0; }