Revision as of 11:34, 18 September 2008 by Pjcannon (Talk)

Part C: Application of Linearity

1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.

2. Yes. $ [Secret Message]*[Secret Matrix]=[Encoded Message]\! $.

3.

Alumni Liaison

Correspondence Chess Grandmaster and Purdue Alumni

Prof. Dan Fleetwood