Revision as of 07:07, 19 September 2008 by Kadafin (Talk)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1.If you take the inverse of the secret matrix and apply it to the message vector starting at the begining. Apply the matrix row by row. Then replace the numbers in the final vector with there corisponding letter

2. No, but she can find the matrix for the input and output. If she knows the input then she does not need to decrypt it.

3.  
 1 0 4     2 ? 0
 0 1 0  => ? 1 ?
 1 0 1     0 ? 3

Alumni Liaison

Ph.D. on Applied Mathematics in Aug 2007. Involved on applications of image super-resolution to electron microscopy

Francisco Blanco-Silva