(New page: 1. Bob can decrypt the message by multiplying the encrypted message with the inverse of the secret matrix. ---- 2. Eve can not decrypt the message without the inverse of the secret matrix....)
 
Line 4: Line 4:
 
----
 
----
 
3.
 
3.
<math>\right{array}{ccc} 1 & 0 & 4 & 0 & 1 & 0 & 1 & 0 & 1 \left</math>
+
<math>\right[ \begin{array}{ccc} 1 & 0 & 4 \\& 0 & 1 & 0 \\& 1 & 0 & 1\end {array} \left</math>

Revision as of 07:14, 19 September 2008

1. Bob can decrypt the message by multiplying the encrypted message with the inverse of the secret matrix.


2. Eve can not decrypt the message without the inverse of the secret matrix. She does however have all the necessary information to find said inverse.


3. $ \right[ \begin{array}{ccc} 1 & 0 & 4 \\& 0 & 1 & 0 \\& 1 & 0 & 1\end {array} \left $

Alumni Liaison

has a message for current ECE438 students.

Sean Hu, ECE PhD 2009