SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Enkripsi Kunci Simetrik
     Matrix arithmetic modulo 26
      Menyamarkan distribusi frekuensi (diffusion)
      Substitusi n simbol
      Perkalian matriks n × n
      Encipher menggunakan matriks K
      Decipher menggunakan matriks K-1




2011-2012-3             Anung Ariwibowo               2
     Plaintext ACT CAT
             [0 2 19 2 0 19]
      Key GYBNQKURP
             [ [6 24 1]
              [13 16 10]
              [20 17 15] ]
      Ciphertext
             POH FIN
             [15 14 17 5 8 13]




2011-2012-3                     Anung Ariwibowo   3
     Matrix arithmetic modulo 26
      Determinan matriks
      Adjoin matriks
      Invers matriks




2011-2012-3            Anung Ariwibowo   4
     A = [
        [5 8]
        [17 3]
       ]
      inv(A) mod 26 = [
        [9 2]
        [1 15]
       ]
      A × inv(A) = [ [53 130] [156 79] ] mod 26
             = [
                [1 0]
                [0 1]
              ]
2011-2012-3             Anung Ariwibowo            5
     Matriks 2 × 2
             A = [ [a b] [c d] ]
             |A| = ad – bc
      Matrix 3 × 3
             A = [
                [a11 a12 a13]
                [a21 a22 a23]
                [a31 a32 a33]
              ]
             |A| = a11 × C11 + a12 × C12 + a13 × C13



2011-2012-3                      Anung Ariwibowo        6
     Cij
             Cofactor matriks A dengan menghapus baris i dan
              kolom j
      Untuk matriks bujursangkar n
             A = [
                [a11 a12 . . a1n]
                [a21 a22 . . a2n]
                . .
                [an1 an2 . . ann]
              ]
             |A| = Σ a1j × C1j, 1 ≤ j ≤ n


2011-2012-3                         Anung Ariwibowo             7
     |A| = Σ a1j × C1j, 1 ≤ j ≤ n
      Indeks i = 1 dapat diganti dengan indeks baris-
       baris yang lain
         1≤i≤n
         Dapat dibuktikan hasil determinannya sama
         Strategi: Cari baris yang paling banyak mengandung
          nilai nol




2011-2012-3                Anung Ariwibowo                     8
     Gaussian Elimination
             Matriks yang diperluas (augmented matriks)
             Operasi Elementer
      Matriks Cofactor dan aturan Cramer
             Minor matriks
             Cofactor matriks
             Determinan matriks




2011-2012-3                    Anung Ariwibowo             9
     K = [ [17 17 5]
          [21 18 21]
          [2 2 19] ]
      Minor matriks Mij
             Submatriks yang didapat dengan menghapus baris i
              dan kolom j
             Hitung determinan dari submatriks tersebut
      Baris 1
             M11 = 18 × 19 – 21 × 2
             M12 = 21 × 19 – 21 × 2
             M13 = 21 × 2 – 18 × 2

2011-2012-3                      Anung Ariwibowo                 10
     Baris 2
         M21 = 17 × 19 – 5 × 2
         M22 = 17 × 19 – 5 × 2
         M23 = 17 × 2 – 17 × 2

      Baris 3
         M31 = 17 × 21 – 5 × 18
         M32 = 17 × 21 – 5 × 21
         M33 = 17 × 18 – 17 × 21




2011-2012-3                  Anung Ariwibowo   11
     Cofactor Cij
             (-1)(i+j) Mij
      Baris 1
         C11 = (-1)(1+1) × 18 × 19 – 21 × 2
         C12 = (-1)(1+2) × 21 × 19 – 21 × 2
         C13 = (-1)(1+3) × 21 × 2 – 18 × 2

      Baris 2
             C21 = (-1)(2+1) × 17 × 19 – 5 × 2
             C22 = (-1)(2+2) × 17 × 19 – 5 × 2
             C23 = (-1)(2+3) × 17 × 2 – 17 × 2
2011-2012-3                        Anung Ariwibowo   12
     Baris 3
         C31 = (-1)(3+1) × 17 × 21 – 5 × 18
         C32 = (-1)(3+2) × 17 × 21 – 5 × 21
         C33 = (-1)(3+3) × 17 × 18 – 17 × 21




2011-2012-3                    Anung Ariwibowo   13
     Matriks yang elemen-elemennya adalah cofactor dari
       matriks asal
      C = [
         [C11 C12 C13]
         [C21 C22 C23]
         [C31 C32 C33]
       ]




2011-2012-3               Anung Ariwibowo                   14
     |A| = Σ a1j × C1j, 1 ≤ j ≤ n
             Ekspansi cofactor sepanjang baris 1
      |A| = Σ ai2 × Ci2, 1 ≤ i ≤ n
             Ekspansi cofactor sepanjang kolom 2
      Hasilnya pasti sama
      Untuk mencari determinan, gunakan ekspansi
       cofactor pada kolom/baris yang paling banyak
       mengandung nilai nol



2011-2012-3                     Anung Ariwibowo       15
     Invers sebuah matriks didapat dengan
       mengalikan invers determinan dengan
       transpos matriks Cofactor
             A-1 = (1/|A|) × CT




2011-2012-3                    Anung Ariwibowo   16
     Tugas Mandiri tentang
         Number Theory
         Matriks
         Primality testing

      UAS
             Alat hitung
             Substitution, Transposition, Number Theory, Public
              key




2011-2012-3                    Anung Ariwibowo                     17
     http://en.wikipedia.org/wiki/Hill_cipher
      http://en.wikipedia.org/wiki/Modular_multiplicative_inverse
      http://en.wikipedia.org/wiki/Cofactor_(linear_algebra)
      Stallings, "Cryptography and Network
       Security"http://williamstallings.com/Cryptography/
      Schneier, "Applied Cryptography" http://www.schneier.com/book-
       applied.html
      Thomas L Noack, http://ece.uprm.edu/~noack/crypto/
      Slides tjerdastangkas.blogspot.com/search/label/ikh323




2011-2012-3                   Anung Ariwibowo                           18

Contenu connexe

Tendances

Introduction to straight line graphs lesson
 Introduction to straight line graphs lesson Introduction to straight line graphs lesson
Introduction to straight line graphs lessonSajidPervez2
 
Straight line-equation.
Straight line-equation.Straight line-equation.
Straight line-equation.SajidPervez2
 
Examen du seconde semestre g8
Examen du seconde semestre g8Examen du seconde semestre g8
Examen du seconde semestre g8zeinabze
 
Mb 106 quantitative techniques 4
Mb 106 quantitative techniques 4Mb 106 quantitative techniques 4
Mb 106 quantitative techniques 4KrishnaRoy45
 
Introduction to operations research
Introduction to operations researchIntroduction to operations research
Introduction to operations researchDr. Abdulfatah Salem
 
Maths: Order of Operations
Maths: Order of OperationsMaths: Order of Operations
Maths: Order of Operationsemmeline4
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanAzhar Khalid
 
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORM
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORMTutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORM
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORMNurul Ainn
 
Connected and disconnected graph
Connected and disconnected graphConnected and disconnected graph
Connected and disconnected graphABDULLAHSHAUKAT4
 
Matrix Manipulation in Matlab
Matrix Manipulation in MatlabMatrix Manipulation in Matlab
Matrix Manipulation in MatlabMohamed Loey
 
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2 On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2 IRJET Journal
 
6.4 inverse matrices t
6.4 inverse matrices t6.4 inverse matrices t
6.4 inverse matrices tmath260
 
Lecture 07 graphing linear equations
Lecture 07 graphing linear equationsLecture 07 graphing linear equations
Lecture 07 graphing linear equationsHazel Joy Chong
 
BUSINESS STATISTICS IMPORTANT QUESTIONS LIST
BUSINESS STATISTICS IMPORTANT QUESTIONS LISTBUSINESS STATISTICS IMPORTANT QUESTIONS LIST
BUSINESS STATISTICS IMPORTANT QUESTIONS LISTRAJASEKHAR REDDY
 
Kem akademik sept 16
Kem akademik  sept 16Kem akademik  sept 16
Kem akademik sept 16SMK Mukah
 

Tendances (20)

Introduction to straight line graphs lesson
 Introduction to straight line graphs lesson Introduction to straight line graphs lesson
Introduction to straight line graphs lesson
 
Straight line-equation.
Straight line-equation.Straight line-equation.
Straight line-equation.
 
Examen du seconde semestre g8
Examen du seconde semestre g8Examen du seconde semestre g8
Examen du seconde semestre g8
 
Mb 106 quantitative techniques 4
Mb 106 quantitative techniques 4Mb 106 quantitative techniques 4
Mb 106 quantitative techniques 4
 
Introduction to operations research
Introduction to operations researchIntroduction to operations research
Introduction to operations research
 
Maths: Order of Operations
Maths: Order of OperationsMaths: Order of Operations
Maths: Order of Operations
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_nauman
 
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORM
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORMTutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORM
Tutorial 1 : SIGNIFICANT FIGURES AND STANDARD FORM
 
Connected and disconnected graph
Connected and disconnected graphConnected and disconnected graph
Connected and disconnected graph
 
Lesson5.1 complexnumbers demo
Lesson5.1 complexnumbers demoLesson5.1 complexnumbers demo
Lesson5.1 complexnumbers demo
 
Matrix Manipulation in Matlab
Matrix Manipulation in MatlabMatrix Manipulation in Matlab
Matrix Manipulation in Matlab
 
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2 On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2
On the Ternary Quadratic Diophantine Equation 4x2 – 7xy2 + 4y2 + x+y+1=19z2
 
Ch 1 Review
Ch 1 ReviewCh 1 Review
Ch 1 Review
 
6.4 inverse matrices t
6.4 inverse matrices t6.4 inverse matrices t
6.4 inverse matrices t
 
1565 matrix01-ppt
1565 matrix01-ppt1565 matrix01-ppt
1565 matrix01-ppt
 
Lecture 07 graphing linear equations
Lecture 07 graphing linear equationsLecture 07 graphing linear equations
Lecture 07 graphing linear equations
 
BUSINESS STATISTICS IMPORTANT QUESTIONS LIST
BUSINESS STATISTICS IMPORTANT QUESTIONS LISTBUSINESS STATISTICS IMPORTANT QUESTIONS LIST
BUSINESS STATISTICS IMPORTANT QUESTIONS LIST
 
Kem akademik sept 16
Kem akademik  sept 16Kem akademik  sept 16
Kem akademik sept 16
 
First semester 1
First semester 1First semester 1
First semester 1
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

En vedette

ikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalAnung Ariwibowo
 
Investment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalInvestment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalJAYARAMAN IYER
 
Reach your peak stuff
Reach your peak stuffReach your peak stuff
Reach your peak stuffGreg Cox
 
Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Faye Brownlie
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presleyhelenavf1
 
Rupert 4.5 UDL and Backwards Design, Jan 2014
Rupert 4.5 UDL and Backwards Design, Jan 2014Rupert 4.5 UDL and Backwards Design, Jan 2014
Rupert 4.5 UDL and Backwards Design, Jan 2014Faye Brownlie
 
Playing in the Sandbox by Wictor Wilén
Playing in the Sandbox by Wictor WilénPlaying in the Sandbox by Wictor Wilén
Playing in the Sandbox by Wictor WilénWictor Wilén
 
Haverhill, MA needs a fiber network
Haverhill, MA needs a fiber network Haverhill, MA needs a fiber network
Haverhill, MA needs a fiber network John Michitson
 
Sizzle Capabilities
Sizzle CapabilitiesSizzle Capabilities
Sizzle Capabilitiesagroben
 
Electric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersElectric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersP K Agarwal
 
Euro Style Design Ltd The Designs
Euro Style Design Ltd The DesignsEuro Style Design Ltd The Designs
Euro Style Design Ltd The DesignsRoland Laufer
 
Finlandia 2009 [Autoguardado]
Finlandia 2009 [Autoguardado]Finlandia 2009 [Autoguardado]
Finlandia 2009 [Autoguardado]guestd4e08
 

En vedette (20)

ikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasional
 
HR Assignment
HR AssignmentHR Assignment
HR Assignment
 
Investment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalInvestment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capital
 
Reach your peak stuff
Reach your peak stuffReach your peak stuff
Reach your peak stuff
 
Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016Quesnel.Adolescent Literacy.Feb 2016
Quesnel.Adolescent Literacy.Feb 2016
 
Wfwpeuropedignity 2011
Wfwpeuropedignity 2011Wfwpeuropedignity 2011
Wfwpeuropedignity 2011
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presley
 
Rupert 4.5 UDL and Backwards Design, Jan 2014
Rupert 4.5 UDL and Backwards Design, Jan 2014Rupert 4.5 UDL and Backwards Design, Jan 2014
Rupert 4.5 UDL and Backwards Design, Jan 2014
 
Playing in the Sandbox by Wictor Wilén
Playing in the Sandbox by Wictor WilénPlaying in the Sandbox by Wictor Wilén
Playing in the Sandbox by Wictor Wilén
 
Haverhill, MA needs a fiber network
Haverhill, MA needs a fiber network Haverhill, MA needs a fiber network
Haverhill, MA needs a fiber network
 
isd312-09-summarization
isd312-09-summarizationisd312-09-summarization
isd312-09-summarization
 
Portfolio:Summer 09
Portfolio:Summer 09Portfolio:Summer 09
Portfolio:Summer 09
 
Vagrant
VagrantVagrant
Vagrant
 
Sizzle Capabilities
Sizzle CapabilitiesSizzle Capabilities
Sizzle Capabilities
 
Electric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumersElectric energy scientific development, main source and consumers
Electric energy scientific development, main source and consumers
 
ikd312-02-three-schema
ikd312-02-three-schemaikd312-02-three-schema
ikd312-02-three-schema
 
Bracciali1
Bracciali1Bracciali1
Bracciali1
 
Euro Style Design Ltd The Designs
Euro Style Design Ltd The DesignsEuro Style Design Ltd The Designs
Euro Style Design Ltd The Designs
 
Pei 2010 2014
Pei 2010 2014Pei 2010 2014
Pei 2010 2014
 
Finlandia 2009 [Autoguardado]
Finlandia 2009 [Autoguardado]Finlandia 2009 [Autoguardado]
Finlandia 2009 [Autoguardado]
 

Similaire à ikh323-06

Similaire à ikh323-06 (20)

Co-factor matrix..
Co-factor matrix..Co-factor matrix..
Co-factor matrix..
 
the inverse of the matrix
the inverse of the matrixthe inverse of the matrix
the inverse of the matrix
 
2. determinantes
2. determinantes2. determinantes
2. determinantes
 
Business mathametics and statistics b.com ii semester (2)
Business mathametics and statistics b.com ii semester (2)Business mathametics and statistics b.com ii semester (2)
Business mathametics and statistics b.com ii semester (2)
 
Fin500J_MatrixAlgebra_2011.ppt
Fin500J_MatrixAlgebra_2011.pptFin500J_MatrixAlgebra_2011.ppt
Fin500J_MatrixAlgebra_2011.ppt
 
Matrix Algebra
Matrix Algebra Matrix Algebra
Matrix Algebra
 
Matrices - Mathematics
Matrices - MathematicsMatrices - Mathematics
Matrices - Mathematics
 
Exams in college algebra
Exams in college algebraExams in college algebra
Exams in college algebra
 
Mat 223_Ch3-Determinants.ppt
Mat 223_Ch3-Determinants.pptMat 223_Ch3-Determinants.ppt
Mat 223_Ch3-Determinants.ppt
 
Matrices & Determinants.pdf
Matrices & Determinants.pdfMatrices & Determinants.pdf
Matrices & Determinants.pdf
 
Debojyoit
Debojyoit Debojyoit
Debojyoit
 
Determinants
DeterminantsDeterminants
Determinants
 
Matrices its types & Rank of matrix.pptx
Matrices its types & Rank of matrix.pptxMatrices its types & Rank of matrix.pptx
Matrices its types & Rank of matrix.pptx
 
Matrices & Determinants
Matrices & DeterminantsMatrices & Determinants
Matrices & Determinants
 
Q addmaths 2011
Q addmaths 2011Q addmaths 2011
Q addmaths 2011
 
Using Formulae Ppp Spm 2009 Ppsx
Using Formulae Ppp Spm 2009 PpsxUsing Formulae Ppp Spm 2009 Ppsx
Using Formulae Ppp Spm 2009 Ppsx
 
Appendix B Matrices And Determinants
Appendix B  Matrices And DeterminantsAppendix B  Matrices And Determinants
Appendix B Matrices And Determinants
 
Form 5 Additional Maths Note
Form 5 Additional Maths NoteForm 5 Additional Maths Note
Form 5 Additional Maths Note
 
Teknik menjawab matematik tambahan 1
Teknik menjawab matematik tambahan 1Teknik menjawab matematik tambahan 1
Teknik menjawab matematik tambahan 1
 
lemh2sm.pdf
lemh2sm.pdflemh2sm.pdf
lemh2sm.pdf
 

Plus de Anung Ariwibowo (20)

isd314-06-association-mining
isd314-06-association-miningisd314-06-association-mining
isd314-06-association-mining
 
ikp213-unifikasi
ikp213-unifikasiikp213-unifikasi
ikp213-unifikasi
 
ikp213-06-horn-clause
ikp213-06-horn-clauseikp213-06-horn-clause
ikp213-06-horn-clause
 
ikp213-01-pendahuluan
ikp213-01-pendahuluanikp213-01-pendahuluan
ikp213-01-pendahuluan
 
ikd312-05-sqlite
ikd312-05-sqliteikd312-05-sqlite
ikd312-05-sqlite
 
ikd312-04-aljabar-relasional
ikd312-04-aljabar-relasionalikd312-04-aljabar-relasional
ikd312-04-aljabar-relasional
 
ikd312-03-design
ikd312-03-designikd312-03-design
ikd312-03-design
 
ikp213-02-pendahuluan
ikp213-02-pendahuluanikp213-02-pendahuluan
ikp213-02-pendahuluan
 
ikh311-08
ikh311-08ikh311-08
ikh311-08
 
ikh311-07
ikh311-07ikh311-07
ikh311-07
 
ikh311-06
ikh311-06ikh311-06
ikh311-06
 
ikh311-05
ikh311-05ikh311-05
ikh311-05
 
ikp321-svn
ikp321-svnikp321-svn
ikp321-svn
 
ikh311-04
ikh311-04ikh311-04
ikh311-04
 
ikp321-05
ikp321-05ikp321-05
ikp321-05
 
imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09
 
ikh311-03
ikh311-03ikh311-03
ikh311-03
 
ikp321-04
ikp321-04ikp321-04
ikp321-04
 
ikp321-03
ikp321-03ikp321-03
ikp321-03
 
ikh311-02
ikh311-02ikh311-02
ikh311-02
 

Dernier

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

ikh323-06

  • 2. Matrix arithmetic modulo 26  Menyamarkan distribusi frekuensi (diffusion)  Substitusi n simbol  Perkalian matriks n × n  Encipher menggunakan matriks K  Decipher menggunakan matriks K-1 2011-2012-3 Anung Ariwibowo 2
  • 3. Plaintext ACT CAT  [0 2 19 2 0 19]  Key GYBNQKURP  [ [6 24 1] [13 16 10] [20 17 15] ]  Ciphertext  POH FIN  [15 14 17 5 8 13] 2011-2012-3 Anung Ariwibowo 3
  • 4. Matrix arithmetic modulo 26  Determinan matriks  Adjoin matriks  Invers matriks 2011-2012-3 Anung Ariwibowo 4
  • 5. A = [ [5 8] [17 3] ]  inv(A) mod 26 = [ [9 2] [1 15] ]  A × inv(A) = [ [53 130] [156 79] ] mod 26  = [ [1 0] [0 1] ] 2011-2012-3 Anung Ariwibowo 5
  • 6. Matriks 2 × 2  A = [ [a b] [c d] ]  |A| = ad – bc  Matrix 3 × 3  A = [ [a11 a12 a13] [a21 a22 a23] [a31 a32 a33] ]  |A| = a11 × C11 + a12 × C12 + a13 × C13 2011-2012-3 Anung Ariwibowo 6
  • 7. Cij  Cofactor matriks A dengan menghapus baris i dan kolom j  Untuk matriks bujursangkar n  A = [ [a11 a12 . . a1n] [a21 a22 . . a2n] . . [an1 an2 . . ann] ]  |A| = Σ a1j × C1j, 1 ≤ j ≤ n 2011-2012-3 Anung Ariwibowo 7
  • 8. |A| = Σ a1j × C1j, 1 ≤ j ≤ n  Indeks i = 1 dapat diganti dengan indeks baris- baris yang lain  1≤i≤n  Dapat dibuktikan hasil determinannya sama  Strategi: Cari baris yang paling banyak mengandung nilai nol 2011-2012-3 Anung Ariwibowo 8
  • 9. Gaussian Elimination  Matriks yang diperluas (augmented matriks)  Operasi Elementer  Matriks Cofactor dan aturan Cramer  Minor matriks  Cofactor matriks  Determinan matriks 2011-2012-3 Anung Ariwibowo 9
  • 10. K = [ [17 17 5] [21 18 21] [2 2 19] ]  Minor matriks Mij  Submatriks yang didapat dengan menghapus baris i dan kolom j  Hitung determinan dari submatriks tersebut  Baris 1  M11 = 18 × 19 – 21 × 2  M12 = 21 × 19 – 21 × 2  M13 = 21 × 2 – 18 × 2 2011-2012-3 Anung Ariwibowo 10
  • 11. Baris 2  M21 = 17 × 19 – 5 × 2  M22 = 17 × 19 – 5 × 2  M23 = 17 × 2 – 17 × 2  Baris 3  M31 = 17 × 21 – 5 × 18  M32 = 17 × 21 – 5 × 21  M33 = 17 × 18 – 17 × 21 2011-2012-3 Anung Ariwibowo 11
  • 12. Cofactor Cij  (-1)(i+j) Mij  Baris 1  C11 = (-1)(1+1) × 18 × 19 – 21 × 2  C12 = (-1)(1+2) × 21 × 19 – 21 × 2  C13 = (-1)(1+3) × 21 × 2 – 18 × 2  Baris 2  C21 = (-1)(2+1) × 17 × 19 – 5 × 2  C22 = (-1)(2+2) × 17 × 19 – 5 × 2  C23 = (-1)(2+3) × 17 × 2 – 17 × 2 2011-2012-3 Anung Ariwibowo 12
  • 13. Baris 3  C31 = (-1)(3+1) × 17 × 21 – 5 × 18  C32 = (-1)(3+2) × 17 × 21 – 5 × 21  C33 = (-1)(3+3) × 17 × 18 – 17 × 21 2011-2012-3 Anung Ariwibowo 13
  • 14. Matriks yang elemen-elemennya adalah cofactor dari matriks asal  C = [ [C11 C12 C13] [C21 C22 C23] [C31 C32 C33] ] 2011-2012-3 Anung Ariwibowo 14
  • 15. |A| = Σ a1j × C1j, 1 ≤ j ≤ n  Ekspansi cofactor sepanjang baris 1  |A| = Σ ai2 × Ci2, 1 ≤ i ≤ n  Ekspansi cofactor sepanjang kolom 2  Hasilnya pasti sama  Untuk mencari determinan, gunakan ekspansi cofactor pada kolom/baris yang paling banyak mengandung nilai nol 2011-2012-3 Anung Ariwibowo 15
  • 16. Invers sebuah matriks didapat dengan mengalikan invers determinan dengan transpos matriks Cofactor  A-1 = (1/|A|) × CT 2011-2012-3 Anung Ariwibowo 16
  • 17. Tugas Mandiri tentang  Number Theory  Matriks  Primality testing  UAS  Alat hitung  Substitution, Transposition, Number Theory, Public key 2011-2012-3 Anung Ariwibowo 17
  • 18. http://en.wikipedia.org/wiki/Hill_cipher  http://en.wikipedia.org/wiki/Modular_multiplicative_inverse  http://en.wikipedia.org/wiki/Cofactor_(linear_algebra)  Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book- applied.html  Thomas L Noack, http://ece.uprm.edu/~noack/crypto/  Slides tjerdastangkas.blogspot.com/search/label/ikh323 2011-2012-3 Anung Ariwibowo 18