Part C: Application of Linearity
1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.
1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.