(New page: == Part C.1 == If Bob knows the secret matrix used to encrypt the message, He can simply take the inverse of that matrix and multiply the encrypted vector by the inverted matrix. ---- ...)
 
Line 1: Line 1:
 
 
== Part C.1 ==
 
== Part C.1 ==
  
 
If Bob knows the secret matrix used to encrypt the message, He can simply take the inverse of that matrix and multiply the encrypted vector by the inverted matrix.
 
If Bob knows the secret matrix used to encrypt the message, He can simply take the inverse of that matrix and multiply the encrypted vector by the inverted matrix.
 
----
 
 
  
 
== Part C.2 ==
 
== Part C.2 ==

Revision as of 12:29, 19 September 2008

Part C.1

If Bob knows the secret matrix used to encrypt the message, He can simply take the inverse of that matrix and multiply the encrypted vector by the inverted matrix.

Part C.2

Yes she can just solve the system of equations represented by the matrix, but in general it is easier to just use matrices to solve such equations.


Part C.3

Alumni Liaison

Ph.D. 2007, working on developing cool imaging technologies for digital cameras, camera phones, and video surveillance cameras.

Buyue Zhang