Revision as of 06:07, 19 September 2008 by Kadafin (Talk)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1.If you take the inverse of the secret matrix and apply it to the message vector starting at the begining. Apply the matrix row by row. Then replace the numbers in the final vector with there corisponding letter

2. No, but she can find the matrix for the input and output. If she knows the input then she does not need to decrypt it.

3.  
 1 0 4     2 ? 0
 0 1 0  => ? 1 ?
 1 0 1     0 ? 3

Alumni Liaison

Correspondence Chess Grandmaster and Purdue Alumni

Prof. Dan Fleetwood