Skip to main content
Mathematics LibreTexts

2.5.1: Application of Matrices in Cryptography (Exercises)

  • Page ID
    37857
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    SECTION 2.5 PROBLEM SET: APPLICATION OF MATRICES IN CRYPTOGRAPHY

    In problems 1 - 8, the letters A to Z correspond to the numbers 1 to 26, as shown below, and a space is represented by the number 27.

    \[\begin{array}{lllllllllllll}
    \mathrm{A} & \mathrm{B} & \mathrm{C} & \mathrm{D} & \mathrm{E} & \mathrm{F} & \mathrm{G} & \mathrm{H} & \mathrm{I} & \mathrm{J} & \mathrm{K} & \mathrm{L} & \mathrm{M} \\
    1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & 10 & 11 & 12 & 13 \\
    \hline \mathrm{N} & \mathrm{O} & \mathrm{P} & \mathrm{Q} & \mathrm{R} & \mathrm{S} & \mathrm{T} & \mathrm{U} & \mathrm{V} & \mathrm{W} & \mathrm{X} & \mathrm{Y} & \mathrm{Z} \\
    14 & 15 & 16 & 17 & 18 & 19 & 20 & 21 & 22 & 23 & 24 & 25 & 26
    \end{array} \nonumber \]

    In problems 1 - 2, use the matrix \(A\), given below, to encode the given messages.

    \[A=\left[\begin{array}{ll}
    3 & 2 \\
    1 & 1
    \end{array}\right] \nonumber \]

    In problems 3 - 4, decode the messages that were encoded using matrix \(A\).
    Make sure to consider the spaces between words, but ignore all punctuation. Add a final space if necessary.

    1. Encode the message: WATCH OUT!
    1. Encode the message: HELP IS ON THE WAY.
    1. Decode the following message:

    64 23 102 41 82 32 97 35 71 28 69 32

    1. Decode the following message:

    105 40 117 48 39 19 69 32 72 27 37 15 114 47

    SECTION 2.5 PROBLEM SET: APPLICATION OF MATRICES IN CRYPTOGRAPHY

    In problems 5 - 6, use the matrix \(B\), given below, to encode the given messages.

    \[\mathrm{B}=\left[\begin{array}{lll}
    1 & 0 & 0 \\
    2 & 1 & 2 \\
    1 & 0 & -1
    \end{array}\right] \nonumber \]

    In problems 7 - 8, decode the messages that were encoded using matrix \(B\).

    Make sure to consider the spaces between words, but ignore all punctuation. Add a final space if necessary.

    1. Encode the message using matrix \(B\):

    LUCK IS ON YOUR SIDE.

    1. Encode the message using matrix \(B\):

    MAY THE FORCE BE WITH YOU.

    1. Decode the following message that was encoded using matrix \(B\):

    8 23 7 4 47 - 2 15 102 -12 20 58 15 27 80 18 12 74 -7

    1. Decode the following message that was encoded using matrix \(B\):

    12 69 - 3 11 53 9 5 46 -10 18 95 - 9 25 107 4 27 76 22 1 72 -26


    This page titled 2.5.1: Application of Matrices in Cryptography (Exercises) is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by Rupinder Sekhon and Roberta Bloom via source content that was edited to the style and standards of the LibreTexts platform; a detailed edit history is available upon request.