Revision as of 07:07, 19 September 2008 by Kadafin (Talk)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1.If you take the inverse of the secret matrix and apply it to the message vector starting at the begining. Apply the matrix row by row. Then replace the numbers in the final vector with there corisponding letter

2. No, but she can find the matrix for the input and output. If she knows the input then she does not need to decrypt it.

3.  
 1 0 4     2 ? 0
 0 1 0  => ? 1 ?
 1 0 1     0 ? 3

Alumni Liaison

Ph.D. 2007, working on developing cool imaging technologies for digital cameras, camera phones, and video surveillance cameras.

Buyue Zhang