math 1300: section 4-5 inverse of a square matrix
DESCRIPTION
TRANSCRIPT
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Math 1300 Finite MathematicsSection 4.5 Inverse of a Square Matrix
Jason Aubrey
Department of MathematicsUniversity of Missouri
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Definition (Identity Matrix for Multiplication)An n × n matrix with the properties that
every element on the principal diagonal is a 1, andevery other element is 0
is called the n × n identity matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Definition (Identity Matrix for Multiplication)An n × n matrix with the properties that
every element on the principal diagonal is a 1, and
every other element is 0is called the n × n identity matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Definition (Identity Matrix for Multiplication)An n × n matrix with the properties that
every element on the principal diagonal is a 1, andevery other element is 0
is called the n × n identity matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Definition (Identity Matrix for Multiplication)An n × n matrix with the properties that
every element on the principal diagonal is a 1, andevery other element is 0
is called the n × n identity matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
For example,
I2 =
[1 00 1
]is the 2× 2 identity matrix.
I3 =
1 0 00 1 00 0 1
is the 3× 3 identity matrix.The reason In is called ’the n× n identity matrix’ is because
AIn = AInB = B
whenever those products are defined.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
For example,
I2 =
[1 00 1
]is the 2× 2 identity matrix.
I3 =
1 0 00 1 00 0 1
is the 3× 3 identity matrix.
The reason In is called ’the n× n identity matrix’ is because
AIn = AInB = B
whenever those products are defined.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
For example,
I2 =
[1 00 1
]is the 2× 2 identity matrix.
I3 =
1 0 00 1 00 0 1
is the 3× 3 identity matrix.The reason In is called ’the n× n identity matrix’ is because
AIn = AInB = B
whenever those products are defined.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]
=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[
2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[
2 − 11 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0)
2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[
2 − 11 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0)
2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2
− 11 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)
1(1) + 3(0) 1(0) + 3(1)
]=
[2
− 11 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)
1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 1
1 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0)
1(0) + 3(1)
]=
[2 − 1
1 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0)
1(0) + 3(1)
]=
[2 − 11
3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11
3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
]
[1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[
2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[
2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0)
1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[
2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0)
1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2
− 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)
0(2) + 1(1) 0(−1) + 1(3)
]=
[2
− 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)
0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 1
1 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1)
0(−1) + 1(3)
]=
[2 − 1
1 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1)
0(−1) + 1(3)
]=
[2 − 11
3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11
3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:[2 −11 3
] [1 00 1
]=
[2(1)− 1(0) 2(0)− 1(1)1(1) + 3(0) 1(0) + 3(1)
]=
[2 − 11 3
][1 00 1
] [2 −11 3
]=
[2(1) + 1(0) 1(−1) + 3(0)0(2) + 1(1) 0(−1) + 1(3)
]=
[2 − 11 3
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:1 0 00 1 00 0 1
2 0 2−1 1 −31 0 3
=
1(2) + 0(−1) + 0(1) 1(0) + 0(1) + 0(0) 1(2) + 0(−3) + 0(3)0(2) + 1(−1) + 0(1) 0(0) + 1(1) + 0(0) 0(2) + 1(−3) + 0(3)0(2) + 0(−1) + 1(1) 0(0) + 0(1) + 1(0) 0(2) + 0(−3) + 1(3)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:1 0 00 1 00 0 1
2 0 2−1 1 −31 0 3
=
1(2) + 0(−1) + 0(1) 1(0) + 0(1) + 0(0) 1(2) + 0(−3) + 0(3)0(2) + 1(−1) + 0(1) 0(0) + 1(1) + 0(0) 0(2) + 1(−3) + 0(3)0(2) + 0(−1) + 1(1) 0(0) + 0(1) + 1(0) 0(2) + 0(−3) + 1(3)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example:1 0 00 1 00 0 1
2 0 2−1 1 −31 0 3
=
1(2) + 0(−1) + 0(1) 1(0) + 0(1) + 0(0) 1(2) + 0(−3) + 0(3)0(2) + 1(−1) + 0(1) 0(0) + 1(1) + 0(0) 0(2) + 1(−3) + 0(3)0(2) + 0(−1) + 1(1) 0(0) + 0(1) + 1(0) 0(2) + 0(−3) + 1(3)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
2 0 2−1 1 −31 0 3
1 0 00 1 00 0 1
=
2(1) + 0(0) + 2(0) 2(0) + 0(1) + 2(0) 2(0) + 0(0) + 2(1)−1(1) + 1(0)− 3(0) −1(0) + 1(1)− 3(0) −1(0) + 1(0)− 3(1)1(1) + 0(0) + 3(0) 1(0) + 0(1) + 3(0) 1(0) + 0(0) + 3(1)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
2 0 2−1 1 −31 0 3
1 0 00 1 00 0 1
=
2(1) + 0(0) + 2(0) 2(0) + 0(1) + 2(0) 2(0) + 0(0) + 2(1)−1(1) + 1(0)− 3(0) −1(0) + 1(1)− 3(0) −1(0) + 1(0)− 3(1)1(1) + 0(0) + 3(0) 1(0) + 0(1) + 3(0) 1(0) + 0(0) + 3(1)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
2 0 2−1 1 −31 0 3
1 0 00 1 00 0 1
=
2(1) + 0(0) + 2(0) 2(0) + 0(1) + 2(0) 2(0) + 0(0) + 2(1)−1(1) + 1(0)− 3(0) −1(0) + 1(1)− 3(0) −1(0) + 1(0)− 3(1)1(1) + 0(0) + 3(0) 1(0) + 0(1) + 3(0) 1(0) + 0(0) + 3(1)
=
2 0 2−1 1 −31 0 3
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
DefinitionLet M be a square matrix of order n and I be the identity matrixof order n. If there exists a matrix M−1 (read "M inverse") suchthat
M−1M = MM−1 = I
then M−1 is called the multiplicative inverse of M or, moresimply, the inverse of M. If no such matrix exists, then M is saidto be a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: The matrices[
3 −4−2 3
]and
[3 42 3
]are inverses of
each other because[3 −4−2 3
] [3 42 3
]=
[1 00 1
]and [
3 42 3
] [3 −4−2 3
]=
[1 00 1
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Since[
2 2−1 −1
] [1 1−1 −1
]=
[0 00 0
]We conclude
that[
2 2−1 −1
]and
[1 1−1 −1
]are not inverses of each other.
(In fact, these matrices have no inverses).
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
To find the inverse of a square matrix M,
1 Form the augmented matrix
[M |I ]
2 Use row operations to transform [M |I ] into [I |B ]
3 The matrix B is the inverse of M; in other words, M−1 = B
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
To find the inverse of a square matrix M,1 Form the augmented matrix
[M |I ]
2 Use row operations to transform [M |I ] into [I |B ]
3 The matrix B is the inverse of M; in other words, M−1 = B
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
To find the inverse of a square matrix M,1 Form the augmented matrix
[M |I ]
2 Use row operations to transform [M |I ] into [I |B ]
3 The matrix B is the inverse of M; in other words, M−1 = B
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
To find the inverse of a square matrix M,1 Form the augmented matrix
[M |I ]
2 Use row operations to transform [M |I ] into [I |B ]
3 The matrix B is the inverse of M; in other words, M−1 = B
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[2 −61 −2
]Find the inverse of M, if it exists.
M−1 =
[−1 3−1
2 1
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[2 −61 −2
]Find the inverse of M, if it exists.
M−1 =
[−1 3−1
2 1
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.
[3 16 2
∣∣∣∣1 00 1
]−2R1+R2→R2−−−−−−−−−→
[3 10 0
∣∣∣∣ 1 0−2 1
]Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.[
3 16 2
∣∣∣∣1 00 1
]
−2R1+R2→R2−−−−−−−−−→[3 10 0
∣∣∣∣ 1 0−2 1
]Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.[
3 16 2
∣∣∣∣1 00 1
]−2R1+R2→R2−−−−−−−−−→
[3 10 0
∣∣∣∣ 1 0−2 1
]Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.[
3 16 2
∣∣∣∣1 00 1
]−2R1+R2→R2−−−−−−−−−→
[3 10 0
∣∣∣∣ 1 0−2 1
]
Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.[
3 16 2
∣∣∣∣1 00 1
]−2R1+R2→R2−−−−−−−−−→
[3 10 0
∣∣∣∣ 1 0−2 1
]Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Example: Let
M =
[3 16 2
]Find the inverse of M, if it exists.[
3 16 2
∣∣∣∣1 00 1
]−2R1+R2→R2−−−−−−−−−→
[3 10 0
∣∣∣∣ 1 0−2 1
]Here we have a problem: the row with zeros on the leftindicates that our matrix M has no inverse.
During the process of finding the inverse of M, if a row resultswith all zeros on the left of the vertical bar (the M side), then Mhas no inverse. In this case, M is called a singular matrix.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Cryptography
Matrix inverses can provide a simple and effective procedurefor encoding and decoding messages.
To begin, assign the numbers 1-26 to the letters in thealphabet. Also assign the number 0 to a blank to provide forspace between words.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Cryptography
Matrix inverses can provide a simple and effective procedurefor encoding and decoding messages.
To begin, assign the numbers 1-26 to the letters in thealphabet. Also assign the number 0 to a blank to provide forspace between words.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
For example, the sequence
19 5 3 18 5 20 0 3 15 4 5
corresponds to the (plaintext) message “SECRET CODE”.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
For example, the sequence
19 5 3 18 5 20 0 3 15 4 5
corresponds to the (plaintext) message “SECRET CODE”.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
For example, the sequence
19 5 3 18 5 20 0 3 15 4 5
corresponds to the (plaintext) message “SECRET CODE”.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
For example, the sequence
19 5 3 18 5 20 0 3 15 4 5
corresponds to the (plaintext) message “SECRET CODE”.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Any matrix whose elements are positive integers and whoseinverse exists can be used as an encoding matrix.
Forexample, to use the 2× 2 matrix
A =
[4 31 1
]to encode the preceeding message, first we divide the numbersin the sequence into groups of 2 and use these groups as thecolumns of a matrix B with 2 rows.
B =
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Any matrix whose elements are positive integers and whoseinverse exists can be used as an encoding matrix. Forexample, to use the 2× 2 matrix
A =
[4 31 1
]to encode the preceeding message,
first we divide the numbersin the sequence into groups of 2 and use these groups as thecolumns of a matrix B with 2 rows.
B =
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Any matrix whose elements are positive integers and whoseinverse exists can be used as an encoding matrix. Forexample, to use the 2× 2 matrix
A =
[4 31 1
]to encode the preceeding message, first we divide the numbersin the sequence into groups of 2 and use these groups as thecolumns of a matrix B with 2 rows.
B =
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Any matrix whose elements are positive integers and whoseinverse exists can be used as an encoding matrix. Forexample, to use the 2× 2 matrix
A =
[4 31 1
]to encode the preceeding message, first we divide the numbersin the sequence into groups of 2 and use these groups as thecolumns of a matrix B with 2 rows.
B =
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Then we multiply on the left by A:
AB =
[4 31 1
] [19 3 5 0 15 55 18 20 3 4 0
]
=
[91 66 80 9 72 2024 21 25 3 19 5
]Thus the coded message (the ciphertext) is
91 24 66 21 80 25 9 3 72 19 20 5
This message can be decoded by putting it back into matrixform and multiplying on the left by the decoding matrix A−1
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Then we multiply on the left by A:
AB =
[4 31 1
] [19 3 5 0 15 55 18 20 3 4 0
]=
[91 66 80 9 72 2024 21 25 3 19 5
]
Thus the coded message (the ciphertext) is
91 24 66 21 80 25 9 3 72 19 20 5
This message can be decoded by putting it back into matrixform and multiplying on the left by the decoding matrix A−1
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Then we multiply on the left by A:
AB =
[4 31 1
] [19 3 5 0 15 55 18 20 3 4 0
]=
[91 66 80 9 72 2024 21 25 3 19 5
]Thus the coded message (the ciphertext) is
91 24 66 21 80 25 9 3 72 19 20 5
This message can be decoded by putting it back into matrixform and multiplying on the left by the decoding matrix A−1
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Then we multiply on the left by A:
AB =
[4 31 1
] [19 3 5 0 15 55 18 20 3 4 0
]=
[91 66 80 9 72 2024 21 25 3 19 5
]Thus the coded message (the ciphertext) is
91 24 66 21 80 25 9 3 72 19 20 5
This message can be decoded by putting it back into matrixform and multiplying on the left by the decoding matrix A−1
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
We have
C =
[91 66 80 9 72 2024 21 25 3 19 5
]and A =
[4 31 1
]
A−1 =
[1 −3−1 4
]To decipher the ciphertext, we multiply:
A−1C =
[1 −3−1 4
] [91 66 80 9 72 2024 21 25 3 19 5
]
=
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
We have
C =
[91 66 80 9 72 2024 21 25 3 19 5
]and A =
[4 31 1
]
A−1 =
[1 −3−1 4
]
To decipher the ciphertext, we multiply:
A−1C =
[1 −3−1 4
] [91 66 80 9 72 2024 21 25 3 19 5
]
=
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
We have
C =
[91 66 80 9 72 2024 21 25 3 19 5
]and A =
[4 31 1
]
A−1 =
[1 −3−1 4
]To decipher the ciphertext, we multiply:
A−1C =
[1 −3−1 4
] [91 66 80 9 72 2024 21 25 3 19 5
]
=
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
We have
C =
[91 66 80 9 72 2024 21 25 3 19 5
]and A =
[4 31 1
]
A−1 =
[1 −3−1 4
]To decipher the ciphertext, we multiply:
A−1C =
[1 −3−1 4
] [91 66 80 9 72 2024 21 25 3 19 5
]
=
[19 3 5 0 15 55 18 20 3 4 0
]
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
P =
[19 3 5 0 15 55 18 20 3 4 0
]
This gives the sequence
19 5 3 18 5 20 0 3 15 4 5
And this corresponds to the plaintext message “SECRETCODE”
.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
P =
[19 3 5 0 15 55 18 20 3 4 0
]This gives the sequence
19 5 3 18 5 20 0 3 15 4 5
And this corresponds to the plaintext message “SECRETCODE”
.
Jason Aubrey Math 1300 Finite Mathematics
university-logo
Identity Matrix for MultiplicationInverse of a Square MatrixApplication: Cryptography
Blank A B C D E F G H I J K L M0 1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z14 15 16 17 18 19 20 21 22 23 24 25 26
P =
[19 3 5 0 15 55 18 20 3 4 0
]This gives the sequence
19 5 3 18 5 20 0 3 15 4 5
And this corresponds to the plaintext message “SECRETCODE”.
Jason Aubrey Math 1300 Finite Mathematics