Revision as of 12:34, 18 September 2008 by Pjcannon (Talk)

Part C: Application of Linearity

1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.

2. Yes. $ [Secret Message]*[Secret Matrix]=[Encoded Message]\! $.

3.

Alumni Liaison

BSEE 2004, current Ph.D. student researching signal and image processing.

Landis Huffman