Computers and Technology

Matrices are commonly used to encrypt data. here is a simple form such an encryption can take. first, we represent each letter in the alphabet by a number, so let us take < space > = 0, a = 1, b = 2, and so on. thus, for example, "abort mission" becomes [1 2 15 18 20 0 13 9 19 19 9 15 14]. to encrypt this coded phrase, we use an invertible matrix of any size with integer entries. for instance, let us take a to be the 2 × 2 matrix 4 3 1 2 . we can first arrange the coded sequence of numbers in the form of a matrix with two rows (using zero in the last place if we have an odd number of characters) and then multiply on the left by a. encrypted matrix = 4 3 1 2 1 15 20 13 19 9 14 2 18 0 9 19 15 0 = 10 114 80 79 133 81 56 5 51 20 31 57 39 14 , which we can also write as [10 5 114 51 80 20 79 31 133 57 81 39 56 14]. to decipher the coded message, multiply the encrypted matrix by a−1. the following question uses the above matrix a for encoding and decoding. decode the following message, which was encrypted using the matrix a. (include any appropriate spaces in your answer.) [57 33 126 54 29 11 80 20 46 29 145 65 74 41]

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 05:10, kellysimkin6196
Read the code below. what will the computer print if the input for year_variable is 1700? if year_variable == 1776: print("your answer is correct. the declaration of independence was signed in “year_variable”.") elif year_variable < 1776: compute_variable = 1776 - year_variable. print("add “compute_variable“ years to your answer for the correct answer.") elif year_variable > 1776: compute_variable = year_variable - 1776 print("subtract “compute_variable” years from your answer for the correct answer.")
Answers: 1
image
Computers and Technology, 23.06.2019 02:00, deeknuk
What is the main benefit of minimizing the ribbon in word? more options will be accessible through customized keystrokes. more of the document will be viewable without needing to scroll. fewer controls will be accessible to the user by using the mouse. fewer editing options will be available without entering a password.
Answers: 1
image
Computers and Technology, 23.06.2019 03:10, kyleereeves2007
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e. g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
image
Computers and Technology, 23.06.2019 15:30, Dweath50
The processing of data in a computer involves the interplay between its various hardware components.
Answers: 1
Do you know the correct answer?
Matrices are commonly used to encrypt data. here is a simple form such an encryption can take. first...

Questions in other subjects:

Konu
Spanish, 03.09.2021 02:30
Konu
Mathematics, 03.09.2021 02:30
Konu
Mathematics, 03.09.2021 02:30