Revision as of 11:34, 18 September 2008 by Pjcannon (Talk)

Part C: Application of Linearity

1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.

2. Yes. $ [Secret Message]*[Secret Matrix]=[Encoded Message]\! $.

3.

Alumni Liaison

Ph.D. 2007, working on developing cool imaging technologies for digital cameras, camera phones, and video surveillance cameras.

Buyue Zhang