class="introduction" class="key-equations" title="Key Equations"class="key-concepts" title="Key Concepts"class="review-exercises" title="Review Exercises"class="practice-test" title="Practice Test"class="try"class="section-exercises"<figure class="splash" id="Figure_09_00_001" style="color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px;"> <figcaption>Enigma machines like this one, once owned by Italian dictator Benito Mussolini, were used by government and military officials for enciphering and deciphering top-secret communications during World War II. (credit: Dave Addey, Flickr)</figcaption> </figure>
By 1943, it was obvious to the Nazi regime that defeat was imminent unless it could build a weapon with unlimited destructive power, one that had never been seen before in the history of the world. In September, Adolf Hitler ordered German scientists to begin building an atomic bomb. Rumors and whispers began to spread from across the ocean. Refugees and diplomats told of the experiments happening in Norway. However, Franklin D. Roosevelt wasn’t sold, and even doubted British Prime Minister Winston Churchill’s warning. Roosevelt wanted undeniable proof. Fortunately, he soon received the proof he wanted when a group of mathematicians cracked the “Enigma” code, proving beyond a doubt that Hitler was building an atomic bomb. The next day, Roosevelt gave the order that the United States begin work on the same.
The Enigma is perhaps the most famous cryptographic device ever known. It stands as an example of the pivotal role cryptography has played in society. Now, technology has moved cryptanalysis to the digital world.
Many ciphers are designed using invertible matrices as the method of message transference, as finding the inverse of a matrix is generally part of the process of decoding. In addition to knowing the matrix and its inverse, the receiver must also know the key that, when used with the matrix inverse, will allow the message to be read.
In this chapter, we will investigate matrices and their inverses, and various ways to use matrices to solve systems of equations. First, however, we will study systems of equations on their own: linear and nonlinear, and then partial fractions. We will not be breaking any secret codes here, but we will lay the foundation for future courses.