(New page: ==How Can Bob Decrypt the Message?== Bob can decrypt the message by multiplying the encrypted vector by the inverse of the matrix used to encrypt the message. Then by replacing the numbers...)
 
(Can Eve Decrypt the Message without Finding the Inverse Matrix?)
Line 3: Line 3:
  
 
==Can Eve Decrypt the Message without Finding the Inverse Matrix?==
 
==Can Eve Decrypt the Message without Finding the Inverse Matrix?==
The answer is she cannot decrypt it without finding the inverse matrix. However, she can use the input and output vectors to find the encryption matrix and then find its inverse to decrypt the message. (Although in her situation she doesn't need to find the encryption matrix or decrypt the message, she already knows the un-coded message (the input-in vector form). So all she needs to know is the algorithm that replaces the letters with numbers in order to intercept the message.)
+
The answer is she cannot decrypt it without finding the inverse matrix. However, she can use the input and output vectors to find the encryption matrix and then find its inverse to decrypt the encrypted message (output vector). (Although in her situation she doesn't need to find the encryption matrix or decrypt the message, she already knows the un-coded message (the input-in vector form). So all she needs to know is the algorithm that replaces the letters with numbers in order to intercept the message.)

Revision as of 16:45, 18 September 2008

How Can Bob Decrypt the Message?

Bob can decrypt the message by multiplying the encrypted vector by the inverse of the matrix used to encrypt the message. Then by replacing the numbers with their corresponding letters, and the 0s with spaces he can read the intended message.

Can Eve Decrypt the Message without Finding the Inverse Matrix?

The answer is she cannot decrypt it without finding the inverse matrix. However, she can use the input and output vectors to find the encryption matrix and then find its inverse to decrypt the encrypted message (output vector). (Although in her situation she doesn't need to find the encryption matrix or decrypt the message, she already knows the un-coded message (the input-in vector form). So all she needs to know is the algorithm that replaces the letters with numbers in order to intercept the message.)

Alumni Liaison

Basic linear algebra uncovers and clarifies very important geometry and algebra.

Dr. Paul Garrett