Lesson 13: Using Matrix Operations for Encryption

16
NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13 PRECALCULUS AND ADVANCED TOPICS Lesson 13: Using Matrix Operations for Encryption 198 This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Lesson 13: Using Matrix Operations for Encryption Student Outcomes Students study and practice the properties of matrix multiplication. Students understand the role of the multiplicative identity matrix. Lesson Notes Data encryption has become a necessity with the rise of sensitive data being stored and transmitted via computers. The methods included in this section are not secure enough to use for applications such as Internet banking, but they result in codes that are not easy to break and provide a good introduction to the ideas of encryption. Interested students can research RSA public-key encryption, which relies on the fact that factoring extremely large numbers is a very difficult and slow process. Students interested in the history of data encryption can research the Cherokee and Choctaw Code Talkers from World War I and the Navajo Code Talkers from World War II. This lesson reinforces concepts of matrix multiplication, matrix inverses, and the identity matrix in the context of encoding and decoding strings of characters using multiplication by either an encoding matrix or its inverse decoding matrix. This lesson aligns with N-VM.C.6 (Use matrices to represent and manipulate data), N-VM.C.8 (Add, subtract, and multiply matrices of appropriate dimensions), and N-VM.C.10 (Understand that the zero and identity matrices play a role in matrix addition and multiplication similar to the role of 0 and 1 in the real numbers. The determinant of a square matrix is nonzero if and only if the matrix has a multiplicative inverse.) The activity in Exercise 2 requires that six stations be set up in advance around the classroom as the messages have been encoded four times. At each station, post the specified decoding matrix: Station 1: 1 =[ βˆ’1 βˆ’1 1 1 2 ] Station 2: 2 =[ 1 6 0 0 1 3 ] Station 3: 3 =[ 1 3 βˆ’ 1 3 βˆ’ 1 3 4 3 ] Station 4: 4 =[ 1 2 βˆ’ 1 2 βˆ’ 3 2 5 2 ] Station 5: 5 =[ βˆ’1 1 0 1 ] Station 6: 6 =[ 2 βˆ’1 βˆ’3 2 ] Divide students into at least six groups numbered 1–6, assign each group their coded message, and start them at their numbered station. Groups apply the decoding matrix to their messages and then move to the next station. After applying four decoding matrices, the original message is revealed. Each group decodes 20 characters of the original message, combining the results into the full quote from the entire class.

Transcript of Lesson 13: Using Matrix Operations for Encryption

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

198

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Lesson 13: Using Matrix Operations for Encryption

Student Outcomes

Students study and practice the properties of matrix multiplication.

Students understand the role of the multiplicative identity matrix.

Lesson Notes

Data encryption has become a necessity with the rise of sensitive data being stored and transmitted via computers. The

methods included in this section are not secure enough to use for applications such as Internet banking, but they result

in codes that are not easy to break and provide a good introduction to the ideas of encryption. Interested students can

research RSA public-key encryption, which relies on the fact that factoring extremely large numbers is a very difficult and

slow process. Students interested in the history of data encryption can research the Cherokee and Choctaw Code

Talkers from World War I and the Navajo Code Talkers from World War II.

This lesson reinforces concepts of matrix multiplication, matrix inverses, and the identity matrix in the context of

encoding and decoding strings of characters using multiplication by either an encoding matrix or its inverse decoding

matrix. This lesson aligns with N-VM.C.6 (Use matrices to represent and manipulate data), N-VM.C.8 (Add, subtract, and

multiply matrices of appropriate dimensions), and N-VM.C.10 (Understand that the zero and identity matrices play a role

in matrix addition and multiplication similar to the role of 0 and 1 in the real numbers. The determinant of a square

matrix is nonzero if and only if the matrix has a multiplicative inverse.)

The activity in Exercise 2 requires that six stations be set up in advance around the classroom as the messages have been

encoded four times. At each station, post the specified decoding matrix:

Station 1:

𝐷1 = [βˆ’1 βˆ’1

11

2

]

Station 2:

𝐷2 = [

1

60

01

3

]

Station 3:

𝐷3 = [

1

3βˆ’

1

3

βˆ’1

3

4

3

]

Station 4:

𝐷4 = [

1

2βˆ’

1

2

βˆ’3

2

5

2

]

Station 5:

𝐷5 = [βˆ’1 10 1

]

Station 6:

𝐷6 = [2 βˆ’1

βˆ’3 2]

Divide students into at least six groups numbered 1–6, assign each group their coded message, and start them at their

numbered station. Groups apply the decoding matrix to their messages and then move to the next station. After

applying four decoding matrices, the original message is revealed. Each group decodes 20 characters of the original

message, combining the results into the full quote from the entire class.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

199

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Classwork

Opening (7 minutes)

The phrase β€œThe crow flies at midnight” appears to have first occurred in Ian Fleming’s James Bond novel From Russia

with Love. It has since become a coded message in spy movies and television shows.

Opening

A common way to send coded messages is to assign each letter of the alphabet to a number πŸβ€“πŸπŸ” and send the message

as a string of integers. For example, if we encode the message β€œTHE CROW FLIES AT MIDNIGHT” according to the chart

below, we get the string of numbers

𝟐𝟎, πŸ–, πŸ“, 𝟎, πŸ‘, πŸπŸ–, πŸπŸ“, πŸπŸ‘, 𝟎, πŸ”, 𝟏𝟐, πŸ—, πŸ“, πŸπŸ—, 𝟎, 𝟏, 𝟐𝟎, 𝟎, πŸπŸ‘, πŸ—, πŸ’, πŸπŸ’, πŸ—, πŸ•, πŸ–, 𝟐𝟎.

A B C D E F G H I J K L M

𝟏 𝟐 πŸ‘ πŸ’ πŸ“ πŸ” πŸ• πŸ– πŸ— 𝟏𝟎 𝟏𝟏 𝟏𝟐 πŸπŸ‘

N O P Q R S T U V W X Y Z SPACE

πŸπŸ’ πŸπŸ“ πŸπŸ” πŸπŸ• πŸπŸ– πŸπŸ— 𝟐𝟎 𝟐𝟏 𝟐𝟐 πŸπŸ‘ πŸπŸ’ πŸπŸ“ πŸπŸ” 𝟎

However, codes such as these are easily broken using an analysis of the frequency of numbers that appear in the coded

messages.

We can instead encode a message using matrix multiplication. If a matrix 𝑬 has an inverse, then we can encode a

message as follows.

First, convert the characters of the message to integers between 𝟏 and πŸπŸ” using the chart above.

If the encoding matrix 𝑬 is an 𝒏 Γ— 𝒏 matrix, then break up the numerical message into 𝒏 rows of the same

length. If needed, add extra zeros to make the rows the same length.

Place the rows into a matrix 𝑴.

Compute the product 𝑬𝑴 to encode the message.

The message is sent as the numbers in the rows of the matrix 𝑬𝑴.

Example (10 minutes)

A common way to send coded messages is to assign each letter of the alphabet to a number 1–26 and send

the message as a string of integers. For example, if we encode the message β€œTHE CROW FLIES AT MIDNIGHT”

according to the chart below, we get the string of numbers

20, 8, 5, 0, 3, 18, 15, 23, 0, 6, 12, 9, 5, 19, 0, 1, 20, 0, 13, 9, 4, 14, 9, 7, 8, 20.

A B C D E F G H I J K L M

1 2 3 4 5 6 7 8 9 10 11 12 13

N O P Q R S T U V W X Y Z SPACE

14 15 16 17 18 19 20 21 22 23 24 25 26 0

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

200

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

However, codes such as these are easily broken using an analysis of the frequency of numbers that appear in the coded

messages. For example, if the coded phrase is 20, 8, 5, 0, 3, 18, 15, 23, 0, 6, 12, 9, 5, 19, 0, 1, 20, 0, 13, 9, 4, 14, 9, 7,

8, 20, we can see that there are three of the letters assigned to the integer 20, so we may want to try putting a common

letter in for the number 20, like S, T, or E. If we assume the word the is used to start the phrase since we have three

letters and then a space, that would lead us to think that maybe the number 5 is E, and so on.

We can instead encode a message using matrix multiplication. If a matrix 𝐸 has an inverse, then we can encode a

message as follows.

First, convert the characters of the message to integers between 1 and 26 using the chart above.

If the encoding matrix 𝐸 is an 𝑛 Γ— 𝑛 matrix, then break up the numerical message into 𝑛 rows of the same

length. If needed, add extra zeros to make the rows the same length. For example, if we want to use an

encoding matrix that is 2 Γ— 2, we would write the message in two rows of equal length, filling in zero for the

last number if the number of letters was odd. If the encoding matrix is 3 Γ— 3, the message would be written in

three equal rows, adding zeros as necessary.

Place the rows into a matrix 𝑀.

Compute the product 𝐸𝑀 to encode the message.

The message is sent as the numbers in the rows of the matrix 𝐸𝑀.

Using the matrix 𝐸 = [2 13 1

], we encode our message as follows:

4, 14, 9, 7, 8, 20.

Since 𝐸 is a 2 Γ— 2 matrix, we need to break up our message into two rows.

20, 8, 5, 0, 3, 18, 15, 23, 0, 6, 12, 9, 5,

19, 0, 1, 20, 0, 13, 9, 4, 14, 9, 7, 8, 20

Then, we place the rows into a matrix 𝑀.

𝑀 = [20 8 5 0 3 18 15 23 0 6 12 9 519 0 1 20 0 13 9 4 14 9 7 8 20

]

Explain how matrix 𝑀 represents β€œTHE CROW FLIES AT MIDNIGHT.”

Each letter and space in the phrase was assigned an integer value, and these numbers represent the

letters in the phrase.

We encode the message into matrix 𝐢 by multiplying 𝐸 β‹… 𝑀.

𝐢 = 𝐸 β‹… 𝑀 = [2 13 1

] [20 8 5 0 3 18 15 23 0 6 12 9 519 0 1 20 0 13 9 4 14 9 7 8 20

]

𝐢 = [59 16 11 20 6 49 39 50 14 21 31 26 3079 24 16 20 9 67 54 73 14 27 43 35 35

]

Thus, the coded message that we send is

59, 16, 11, 20, 6, 49, 39, 50, 14, 21, 31, 26, 30, 79, 24, 16, 20, 9, 67, 54, 73, 14, 27, 43, 35, 35.

If this coded message is intercepted, then it cannot easily be decoded unless the recipient knows how it was

originally encoded.

Be sure to work through this discussion, and emphasize that the way to decode a message is to multiply by the inverse of

the encoding message.

Scaffolding:

Students who are

struggling can be given a

simpler phrase such as β€œBe

Happy” or β€œDream Big.”

Have advanced learners

find their own phrase of

30 characters or more and

encode using a 3 Γ— 3

matrix.

MP.2

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

201

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Using what you know about how the message was encoded, as well as matrix multiplication, describe how you

would decode this message.

We need to know a decoding matrix 𝐷.

How can we find that matrix?

The decoding matrix is the inverse of the encoding matrix, so 𝐷 = πΈβˆ’1.

What is the decoding matrix?

𝐷 = πΈβˆ’1 = [2 13 1

]βˆ’1

=1

2βˆ’3[

1 βˆ’1βˆ’3 2

] = [βˆ’1 13 βˆ’2

]

Decode this message!

𝐷 β‹… 𝐢 = [βˆ’1 13 βˆ’2

] [59 16 11 20 6 49 39 50 14 21 31 26 3079 24 16 20 9 67 54 73 14 27 43 35 35

]

= [20 8 5 0 3 18 15 23 0 6 12 9 519 0 1 20 0 13 9 4 14 9 7 8 20

]

As expected, this is the matrix 𝑀 that stored our original message β€œTHE CROW FLIES AT MIDNIGHT.”

Why does this process work?

The coded message stored in matrix 𝐢 is the product of matrices 𝐸 and 𝑀, so 𝐢 = 𝐸 β‹… 𝑀. We then

decode the message stored in matrix 𝐢 by multiplying by matrix 𝐷. Since matrices 𝐷 and 𝐸 are

inverses, we have

𝐷 β‹… (𝐸 β‹… 𝑀) = (𝐷 β‹… 𝐸) β‹… 𝑀 = 𝐼 β‹… 𝑀 = 𝑀.

So, encoding and then decoding returns the original message in matrix 𝑀.

Explain to your neighbor what you learned about how to encode and decode messages. Teachers should use

this as an informal way to check for understanding.

Exercise 1 (7 minutes)

The encoded phrase in this exercise is β€œARCHIMEDES.” Archimedes (c. 287–212 B.C.E., Greece) is regarded as the

greatest mathematician of his age and one of the greatest of all time. He developed and applied an early form of

integral calculus to derive correct formulas for the area of a circle, volume of a sphere, and area under a parabola. He

also found accurate approximations of irrational numbers such as √3 and πœ‹. However, during his lifetime he was known

more for his inventions such as the Archimedean screw, compound pulleys, and weapons such as the Claw of

Archimedes used to protect Syracuse in times of war.

The original message is stored in matrix 𝑀 = [1 18 3 89 13 5 45 19 0 0

], and the matrix used to encode the message is

𝐸 = [1 2 30 2 11 1 1

]. This exercise introduces students to using a larger matrix to perform the encoding and decoding and

requires that students practice matrix multiplication with non-integer matrix entries. Additionally, because students

have not learned a method for finding the inverse of a 3 Γ— 3 matrix, they must demonstrate understanding of the

meaning of a matrix inverse in order to decode this matrix.

MP.4

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

202

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Exercises

1. You have received an encoded message: πŸ‘πŸ’, 𝟏𝟎𝟏, πŸπŸ‘, πŸπŸ”, πŸπŸ‘, πŸ’πŸ“, 𝟏𝟎, πŸ–, πŸπŸ“, πŸ“πŸŽ, πŸ–, 𝟏𝟐.

You know that the message was encoded using matrix 𝑬 = [𝟏 𝟐 πŸ‘πŸŽ 𝟐 𝟏𝟏 𝟏 𝟏

].

a. Store your message in a matrix π‘ͺ. What are the dimensions of π‘ͺ?

There are 𝟏𝟐 numbers in the coded message, and it was encoded using a

πŸ‘ Γ— πŸ‘ matrix. Thus, the matrix π‘ͺ needs to have three rows. That means π‘ͺ has four

columns, so π‘ͺ is a πŸ‘ Γ— πŸ’ matrix.

b. You have forgotten whether the proper decoding matrix is matrix 𝑿, 𝒀, or 𝒁 as shown

below. Determine which of these is the correct matrix to use to decode this message.

𝑿 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘

𝟏

πŸ‘

βˆ’πŸ

πŸ‘

𝟏

πŸ‘βˆ’

𝟐

πŸ‘]

, 𝒀 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘βˆ’

𝟏

πŸ‘πŸ

πŸ‘βˆ’

𝟏

πŸ‘

𝟐

πŸ‘ ]

, 𝒁 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘

𝟏

πŸ‘πŸ

πŸ‘βˆ’

𝟏

πŸ‘βˆ’

𝟐

πŸ‘]

Matrices used to encode and decode messages must be inverses of each other. Thus, the correct decoding

matrix is the matrix 𝑫 so that 𝑫 β‹… 𝑬 = 𝑰. We can find the correct decoding matrix by multiplying 𝑿 β‹… 𝑬, 𝒀 β‹… 𝑬,

and 𝒁 β‹… 𝑬.

𝑿 β‹… 𝑬 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘

𝟏

πŸ‘

βˆ’πŸ

πŸ‘

𝟏

πŸ‘βˆ’

𝟐

πŸ‘]

β‹… [𝟏 𝟐 πŸ‘πŸŽ 𝟐 𝟏𝟏 𝟏 𝟏

] = [

𝟏 𝟎 𝟎𝟎 𝟏 𝟎

βˆ’πŸ’

πŸ‘βˆ’

πŸ’

πŸ‘βˆ’

πŸ•

πŸ‘

]

𝒀 β‹… 𝑬 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘βˆ’

𝟏

πŸ‘πŸ

πŸ‘βˆ’

𝟏

πŸ‘

𝟐

πŸ‘ ]

β‹… [𝟏 𝟐 πŸ‘πŸŽ 𝟐 𝟏𝟏 𝟏 𝟏

] =

[

𝟏 𝟎 𝟎

βˆ’πŸ

πŸ‘

𝟏

πŸ‘βˆ’

𝟐

πŸ‘πŸ’

πŸ‘

πŸ’

πŸ‘

πŸ•

πŸ‘ ]

𝒁 β‹… 𝑬 =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘

𝟏

πŸ‘πŸ

πŸ‘βˆ’

𝟏

πŸ‘βˆ’

𝟐

πŸ‘]

β‹… [𝟏 𝟐 πŸ‘πŸŽ 𝟐 𝟏𝟏 𝟏 𝟏

] = [𝟏 𝟎 𝟎𝟎 𝟏 𝟎𝟎 𝟎 𝟏

]

Since 𝒁 β‹… 𝑬 = 𝑰, we know that 𝒁 is the decoding matrix we need.

Scaffolding:

Students may need to be

reminded that the

matrices used to encode

and decode a message are

inverses.

Students may also need to

be reminded of the

property that defines

inverse matrices: 𝐴 and 𝐡

are inverse matrices if

𝐴 β‹… 𝐡 = 𝐼.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

203

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

c. Decode the message.

Using matrix 𝒁 to decode, we have

𝑴 = 𝒁 β‹… π‘ͺ =

[ βˆ’

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

πŸ’

πŸ‘

βˆ’πŸ

πŸ‘

𝟐

πŸ‘

𝟏

πŸ‘πŸ

πŸ‘βˆ’

𝟏

πŸ‘βˆ’

𝟐

πŸ‘]

β‹… [πŸ‘πŸ’ 𝟏𝟎𝟏 πŸπŸ‘ πŸπŸ”πŸπŸ‘ πŸ’πŸ“ 𝟏𝟎 πŸ–πŸπŸ“ πŸ“πŸŽ πŸ– 𝟏𝟐

]

=

[ βˆ’

πŸ‘πŸ’

πŸ‘βˆ’

πŸπŸ‘

πŸ‘+

πŸ”πŸŽ

πŸ‘βˆ’

𝟏𝟎𝟏

πŸ‘βˆ’

πŸ’πŸ“

πŸ‘+

𝟐𝟎𝟎

πŸ‘βˆ’

πŸπŸ‘

πŸ‘βˆ’

𝟏𝟎

πŸ‘+

πŸ‘πŸ

πŸ‘βˆ’

πŸπŸ”

πŸ‘βˆ’

πŸ–

πŸ‘+

πŸ’πŸ–

πŸ‘

βˆ’πŸ‘πŸ’

πŸ‘+

πŸ’πŸ”

πŸ‘+

πŸπŸ“

πŸ‘βˆ’

𝟏𝟎𝟏

πŸ‘+

πŸ—πŸŽ

πŸ‘+

πŸ“πŸŽ

πŸ‘βˆ’

πŸπŸ‘

πŸ‘+

𝟐𝟎

πŸ‘+

πŸ–

πŸ‘βˆ’

πŸπŸ”

πŸ‘+

πŸπŸ”

πŸ‘+

𝟏𝟐

πŸ‘πŸ”πŸ–

πŸ‘βˆ’

πŸπŸ‘

πŸ‘βˆ’

πŸ‘πŸŽ

πŸ‘

𝟐𝟎𝟐

πŸ‘βˆ’

πŸ—πŸŽ

πŸ‘βˆ’

𝟏𝟎𝟎

πŸ‘

πŸπŸ”

πŸ‘βˆ’

𝟏𝟎

πŸ‘βˆ’

πŸπŸ”

πŸ‘

πŸ‘πŸ

πŸ‘βˆ’

πŸ–

πŸ‘βˆ’

πŸπŸ’

πŸ‘ ]

= [𝟏 πŸπŸ– πŸ‘ πŸ–πŸ— πŸπŸ‘ πŸ“ πŸ’πŸ“ πŸ’ 𝟎 𝟎

] .

The decoded message is β€œARCHIMEDES.”

Exercises 2–3 (15 minutes)

In this exercise, groups of students decode separate parts of a message that have been encoded four times; as groups

complete the decoding of their portion of the message, have them record it in a location that all students can seeβ€”

either on the white board or projected through a document camera, for example. The decoded messages together spell

out a famous quote by Albert Einstein: β€œDo not worry about your difficulties in mathematics. I can assure you that mine

are still greater.” Substitute a different quote if preferred, perhaps a school motto. Carefully encode each of six

portions of a quote stored in matrices 𝑀1 to 𝑀6 using encoding matrices 𝐸1 to 𝐸6 as follows.

𝐢1 = 𝐸1 β‹… 𝐸2 β‹… 𝐸3 β‹… 𝐸4 β‹… 𝑀1

𝐢2 = 𝐸2 β‹… 𝐸3 β‹… 𝐸4 β‹… 𝐸5 β‹… 𝑀2

𝐢3 = 𝐸3 β‹… 𝐸4 β‹… 𝐸5 β‹… 𝐸6 β‹… 𝑀3

𝐢4 = 𝐸4 β‹… 𝐸5 β‹… 𝐸6 β‹… 𝐸1 β‹… 𝑀4

𝐢5 = 𝐸5 β‹… 𝐸6 β‹… 𝐸1 β‹… 𝐸2 β‹… 𝑀5

𝐢6 = 𝐸6 β‹… 𝐸1 β‹… 𝐸2 β‹… 𝐸3 β‹… 𝑀6

𝐸1 = [1 2

βˆ’2 βˆ’2]; 𝐸2 = [

6 00 3

]; 𝐸3 = [4 11 1

]; 𝐸4 = [5 13 1

]; 𝐸5 = [βˆ’1 10 1

]; 𝐸6 = [2 13 2

]

Divide the class into at least six groups of two or three students, numbered 1–6, assigning multiple groups to the same

number as needed. Set up six stations around the room in a circular arrangement. Have each group start at the station

with the same number as the groupβ€”Group 1 starts at Station 1, Group 2 starts at Station 2, etc. At each station, the

groups apply the posted decoding matrix to their encoded messages shown below, and then they progress to the next

station, with groups at Station 6 proceeding to Station 1. It requires four decoding steps with different matrices (such as

𝐷2, 𝐷3, 𝐷4 and 𝐷5) to uncover a group’s portion of the original message.

Scaffolding:

For struggling students, select a

shorter quote, or encode it in

fewer than four steps.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

204

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

At each station, post the matrix listed below.

Station 1: 𝐷1 = [βˆ’1 βˆ’1

112

]

Station 2: 𝐷2 = [

16

0

013

]

Station 3: 𝐷3 = [

13

βˆ’13

βˆ’13

43

]

Station 4: 𝐷4 = [

12

βˆ’12

βˆ’32

52

]

Station 5: 𝐷5 = [βˆ’1 10 1

]

Station 6: 𝐷6 = [2 βˆ’1

βˆ’3 2]

2. You have been assigned a group number. The message your group receives is listed below. This message is TOP

SECRET! It is of such importance that it has been encoded four times.

Your group’s portion of the coded message is listed below.

Group 1:

πŸπŸ“πŸŽπŸŽ, πŸ‘πŸ–πŸ’πŸŽ, 𝟎, πŸ‘πŸ’πŸ’πŸ’, πŸ‘πŸ’πŸπŸŽ, πŸ’πŸ‘πŸ“πŸŽ, 𝟎, πŸ’πŸ–πŸπŸ’, πŸ‘πŸ”πŸ•πŸ, πŸ‘πŸ’πŸ•πŸ’, βˆ’πŸπŸ“πŸ—πŸ, βˆ’πŸ”πŸ”πŸ”πŸŽ, 𝟎, βˆ’πŸ“πŸ—πŸ•πŸ”, βˆ’πŸ“πŸ—πŸ’πŸŽ, βˆ’πŸ•πŸ“πŸ”πŸŽ, 𝟎,

βˆ’πŸ–πŸ‘πŸ–πŸ–, βˆ’πŸ”πŸ‘πŸ•πŸ, βˆ’πŸ”πŸŽπŸ’πŸ–

Group 2:

πŸπŸ’πŸπŸ’, πŸ‘πŸŽπŸπŸ’, βˆ’πŸπŸ‘πŸ–, πŸ‘πŸ—πŸ”, βˆ’πŸ“πŸ“πŸ–, βˆ’πŸπŸ–πŸ—πŸŽ, βˆ’πŸπŸ•πŸ“πŸ, πŸπŸ“πŸπŸ, βˆ’πŸπŸ—πŸ’πŸ”, πŸπŸ’πŸ“πŸ–, πŸ’πŸ‘πŸ–, πŸ“πŸ’πŸŽ, βˆ’πŸπŸ’, πŸ•πŸ, βˆ’πŸ—πŸŽ, βˆ’πŸ‘πŸπŸ’, βˆ’πŸ‘πŸŽπŸŽ,

πŸπŸ•πŸŽ, βˆ’πŸ“πŸπŸŽ, πŸπŸ•πŸŽ

Group 3:

πŸ’πŸ–πŸ—, πŸπŸ’πŸπŸŽ, πŸ”πŸŽπŸ”, πŸ‘πŸ“πŸ“, πŸπŸπŸ“πŸ, πŸ‘πŸ‘, 𝟏𝟎𝟎𝟐, πŸ–πŸπŸ—, πŸ—πŸ—, 𝟏𝟏𝟐𝟏, πŸπŸ–πŸŽ, πŸ“πŸπŸŽ, 𝟐𝟐𝟐, πŸπŸ‘πŸŽ, πŸ’πŸπŸ, 𝟏𝟐, πŸ‘πŸ”πŸ”, πŸ‘πŸŽπŸ’, πŸ‘πŸ”, πŸ’πŸπŸŽ

Group 4:

βˆ’πŸπŸ–, 𝟏𝟎, βˆ’πŸπŸ–, πŸ’πŸ’, βˆ’πŸ“πŸ’, πŸ’πŸ, βˆ’πŸ”, βˆ’πŸ•πŸ’, βˆ’πŸ—πŸ–, βˆ’πŸπŸπŸ’, 𝟎, 𝟏𝟎, βˆ’πŸπŸ, πŸ’πŸ”, βˆ’πŸπŸ”, πŸ’πŸ, βˆ’πŸ’, βˆ’πŸ‘πŸ”, βˆ’πŸ”πŸŽ, βˆ’πŸ–πŸ

Group 5:

βˆ’πŸπŸπŸŽ, 𝟎, βˆ’πŸ•πŸ–, βˆ’πŸ“πŸ’, βˆ’πŸ–πŸ’, βˆ’πŸ‘πŸŽ, 𝟎, βˆ’πŸ”, βˆ’πŸπŸŽπŸ–, βˆ’πŸ‘πŸŽ, βˆ’πŸπŸπŸŽ, πŸπŸπŸ’, πŸ’πŸ, 𝟎, βˆ’πŸπŸ, πŸ’πŸ, 𝟎, πŸ‘πŸ”, 𝟎, 𝟎

Group 6:

πŸπŸπŸ”, 𝟏𝟐𝟎, πŸ”πŸŽ, πŸπŸ”πŸ, πŸ–πŸ’, 𝟏𝟐𝟎, πŸπŸ—πŸ, πŸ’πŸ, πŸ–πŸ’, πŸπŸ—πŸ, βˆ’πŸπŸ–, βˆ’πŸ‘πŸ”πŸŽ, βˆ’πŸ—πŸŽ, βˆ’πŸ‘πŸπŸ’, 𝟎, βˆ’πŸπŸ–, βˆ’πŸπŸπŸ”, βˆ’πŸ‘πŸ”, βˆ’πŸ—πŸŽ, βˆ’πŸ‘πŸπŸ’

a. Store your message in a matrix π‘ͺ with two rows. How many columns does matrix π‘ͺ have?

(Sample responses are provided for Group 1.) Our message is stored in a matrix with ten columns:

π‘ͺ = [πŸπŸ“πŸŽπŸŽ πŸ‘πŸ–πŸ’πŸŽ 𝟎 πŸ‘πŸ’πŸ’πŸ’ πŸ‘πŸ’πŸπŸŽ πŸ’πŸ‘πŸ“πŸŽ 𝟎 πŸ’πŸ–πŸπŸ’ πŸ‘πŸ”πŸ•πŸ πŸ‘πŸ’πŸ•πŸ’

βˆ’πŸπŸ“πŸ—πŸ βˆ’πŸ”πŸ”πŸ”πŸŽ 𝟎 βˆ’πŸ“πŸ—πŸ•πŸ” βˆ’πŸ“πŸ—πŸ’πŸŽ βˆ’πŸ•πŸ“πŸ”πŸŽ 𝟎 βˆ’πŸ–πŸ‘πŸ–πŸ– βˆ’πŸ”πŸ‘πŸ•πŸ βˆ’πŸ”πŸŽπŸ’πŸ–]

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

205

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

b. Begin at the station of your group number, and apply the decoding matrix at this first station.

π‘«πŸ = [βˆ’πŸ βˆ’πŸ

𝟏𝟏

𝟐]

π‘«πŸ β‹… π‘ͺ = [βˆ’πŸ βˆ’πŸ

𝟏𝟏

𝟐] β‹… [

πŸπŸ“πŸŽπŸŽ πŸ‘πŸ–πŸ’πŸŽ 𝟎 πŸ‘πŸ’πŸ’πŸ’ πŸ‘πŸ’πŸπŸŽ πŸ’πŸ‘πŸ“πŸŽ 𝟎 πŸ’πŸ–πŸπŸ’ πŸ‘πŸ”πŸ•πŸ πŸ‘πŸ’πŸ•πŸ’βˆ’πŸπŸ“πŸ—πŸ βˆ’πŸ”πŸ”πŸ”πŸŽ 𝟎 βˆ’πŸ“πŸ—πŸ•πŸ” βˆ’πŸ“πŸ—πŸ’πŸŽ βˆ’πŸ•πŸ“πŸ”πŸŽ 𝟎 βˆ’πŸ–πŸ‘πŸ–πŸ– βˆ’πŸ”πŸ‘πŸ•πŸ βˆ’πŸ”πŸŽπŸ’πŸ–

]

= [πŸπŸŽπŸ—πŸ πŸπŸ–πŸπŸŽ 𝟎 πŸπŸ“πŸ‘πŸ πŸπŸ“πŸπŸŽ πŸ‘πŸπŸπŸŽ 𝟎 πŸ‘πŸ“πŸ”πŸ’ πŸπŸ•πŸŽπŸŽ πŸπŸ“πŸ•πŸ’πŸπŸŽπŸ’ πŸ“πŸπŸŽ 𝟎 πŸ’πŸ“πŸ” πŸ’πŸ“πŸŽ πŸ“πŸ•πŸŽ 𝟎 πŸ”πŸ‘πŸŽ πŸ’πŸ–πŸ” πŸ’πŸ“πŸŽ

]

c. Proceed to the next station in numerical order; if you are at Station 6, proceed to Station 1. Apply the

decoding matrix at this second station.

π‘«πŸ = [

𝟏

πŸ”πŸŽ

𝟎𝟏

πŸ‘

]

π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = [

𝟏

πŸ”πŸŽ

𝟎𝟏

πŸ‘

] β‹… [πŸπŸŽπŸ—πŸ πŸπŸ–πŸπŸŽ 𝟎 πŸπŸ“πŸ‘πŸ πŸπŸ“πŸπŸŽ πŸ‘πŸπŸπŸŽ 𝟎 πŸ‘πŸ“πŸ”πŸ’ πŸπŸ•πŸŽπŸŽ πŸπŸ“πŸ•πŸ’πŸπŸŽπŸ’ πŸ“πŸπŸŽ 𝟎 πŸ’πŸ“πŸ” πŸ’πŸ“πŸŽ πŸ“πŸ•πŸŽ 𝟎 πŸ”πŸ‘πŸŽ πŸ’πŸ–πŸ” πŸ’πŸ“πŸŽ

]

= [πŸπŸ–πŸ πŸ’πŸ•πŸŽ 𝟎 πŸ’πŸπŸ πŸ’πŸπŸŽ πŸ“πŸ‘πŸ“ 𝟎 πŸ“πŸ—πŸ’ πŸ’πŸ“πŸŽ πŸ’πŸπŸ—πŸ”πŸ– πŸπŸ•πŸŽ 𝟎 πŸπŸ“πŸ πŸπŸ“πŸŽ πŸπŸ—πŸŽ 𝟎 𝟐𝟏𝟎 πŸπŸ”πŸ πŸπŸ“πŸŽ

]

d. Proceed to the next station in numerical order; if you are at Station 6, proceed to Station 1. Apply the

decoding matrix at this third station.

π‘«πŸ‘ = [

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

βˆ’πŸ

πŸ‘

πŸ’

πŸ‘

]

π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = [

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

βˆ’πŸ

πŸ‘

πŸ’

πŸ‘

] β‹… [πŸπŸ–πŸ πŸ’πŸ•πŸŽ 𝟎 πŸ’πŸπŸ πŸ’πŸπŸŽ πŸ“πŸ‘πŸ“ 𝟎 πŸ“πŸ—πŸ’ πŸ’πŸ“πŸŽ πŸ’πŸπŸ—πŸ”πŸ– πŸπŸ•πŸŽ 𝟎 πŸπŸ“πŸ πŸπŸ“πŸŽ πŸπŸ—πŸŽ 𝟎 𝟐𝟏𝟎 πŸπŸ”πŸ πŸπŸ“πŸŽ

]

= [πŸ‘πŸ– 𝟏𝟎𝟎 𝟎 πŸ—πŸŽ πŸ—πŸŽ πŸπŸπŸ“ 𝟎 πŸπŸπŸ– πŸ—πŸ” πŸ—πŸ‘πŸ‘πŸŽ πŸ•πŸŽ 𝟎 πŸ”πŸ πŸ”πŸŽ πŸ•πŸ“ 𝟎 πŸ–πŸ πŸ”πŸ” πŸ“πŸ•

]

e. Proceed to the next station in numerical order; if you are at Station 6, proceed to Station 1. Apply the

decoding matrix at this fourth station.

π‘«πŸ’ = [

𝟏

πŸβˆ’

𝟏

𝟐

βˆ’πŸ‘

𝟐

πŸ“

𝟐

]

π‘«πŸ’ β‹… π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = [

𝟏

πŸβˆ’

𝟏

𝟐

βˆ’πŸ‘

𝟐

πŸ“

𝟐

] β‹… [πŸ‘πŸ– 𝟏𝟎𝟎 𝟎 πŸ—πŸŽ πŸ—πŸŽ πŸπŸπŸ“ 𝟎 πŸπŸπŸ– πŸ—πŸ” πŸ—πŸ‘πŸ‘πŸŽ πŸ•πŸŽ 𝟎 πŸ”πŸ πŸ”πŸŽ πŸ•πŸ“ 𝟎 πŸ–πŸ πŸ”πŸ” πŸ“πŸ•

]

= [πŸ’ πŸπŸ“ 𝟎 πŸπŸ’ πŸπŸ“ 𝟐𝟎 𝟎 πŸπŸ‘ πŸπŸ“ πŸπŸ–πŸπŸ– πŸπŸ“ 𝟎 𝟐𝟎 πŸπŸ“ πŸπŸ“ 𝟎 πŸπŸ‘ 𝟐𝟏 πŸ‘

]

f. If we know the original message had 𝟐𝟏 characters and the last letter was an H, decode your message.

The numerical message is πŸ’, πŸπŸ“, 𝟎, πŸπŸ’, πŸπŸ“, 𝟐𝟎, 𝟎, πŸπŸ‘, πŸπŸ“, πŸπŸ–, πŸπŸ–, πŸπŸ“, 𝟎, 𝟐𝟎, πŸπŸ“, πŸπŸ“, 𝟎, πŸπŸ‘, 𝟐𝟏, πŸ‘, which

represents the characters β€œDO NOT WORRY TOO MUCH.”

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

206

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

3. Sydnie was in Group 1 and tried to decode her message by calculating the matrix (π‘«πŸ β‹… π‘«πŸ β‹… π‘«πŸ‘ β‹… π‘«πŸ’) and then

multiplying (π‘«πŸ β‹… π‘«πŸ β‹… π‘«πŸ‘ β‹… π‘«πŸ’) β‹… π‘ͺ. This produced the matrix

𝑴 = [

πŸπŸŽπŸ“πŸπŸ”

πŸ‘

πŸπŸ•πŸŽπŸπŸŽ

πŸ‘πŸŽ

πŸπŸ’πŸπŸ’πŸ

πŸ‘πŸ–πŸŽπŸ‘πŸŽ

πŸ‘πŸŽπŸ”πŸ“πŸ“

πŸ‘πŸŽ πŸπŸπŸ‘πŸ‘πŸ” πŸ–πŸ”πŸπŸ” πŸ–πŸπŸ•πŸ

βˆ’πŸπŸ’πŸ“πŸ“ βˆ’πŸ‘πŸ•πŸ‘πŸ“ 𝟎 βˆ’πŸ‘πŸ‘πŸ“πŸ βˆ’πŸ‘πŸ‘πŸ‘πŸŽ βˆ’πŸ–πŸ’πŸ•πŸ“

𝟐𝟎 βˆ’πŸ’πŸ•πŸŽπŸ βˆ’πŸ‘πŸ“πŸ•πŸ‘ βˆ’

πŸ”πŸπŸ•πŸ•

𝟐

] .

a. How did she know that she made a mistake?

If Sydnie had properly decoded her message, all entries in the matrix 𝑴 would be integers between 𝟎 and πŸπŸ”.

b. Matrix π‘ͺ was encoded using matrices π‘¬πŸ, π‘¬πŸ, π‘¬πŸ‘, and π‘¬πŸ’, where π‘«πŸ decodes a message encoded by π‘¬πŸ, π‘«πŸ

decodes a message encoded by π‘¬πŸ, and so on. What is the relationship between matrices π‘¬πŸ and π‘«πŸ,

between π‘¬πŸ and π‘«πŸ, etc.?

Matrices π‘¬πŸ and π‘«πŸ are inverse matrices, as are π‘¬πŸ and π‘«πŸ, π‘¬πŸ‘, and π‘«πŸ‘, and so on.

c. The matrix that Sydnie received was encoded by π‘ͺ = π‘¬πŸ β‹… π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴. Explain to Sydnie how the

decoding process works to recover the original matrix 𝑴, and devise a correct method for decoding using

multiplication by a single decoding matrix.

Since π‘ͺ = π‘¬πŸ β‹… π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴, we can recover the original matrix 𝑴 by multiplying both sides of this

equation by the proper decoding matrix at each step, remembering that π‘«πŸ β‹… π‘¬πŸ = 𝑰, π‘«πŸ β‹… π‘¬πŸ = 𝑰, etc.

π‘ͺ = π‘¬πŸ β‹… π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴

π‘«πŸ β‹… π‘ͺ = π‘«πŸ β‹… (π‘¬πŸ β‹… π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= (π‘«πŸ β‹… π‘¬πŸ) β‹… (π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= 𝑰 β‹… (π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= (π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = π‘«πŸ β‹… (π‘¬πŸ β‹… π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= (π‘«πŸ β‹… π‘¬πŸ) β‹… (π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= 𝑰 β‹… (π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= (π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = π‘«πŸ‘ β‹… (π‘¬πŸ‘ β‹… π‘¬πŸ’ β‹… 𝑴)

= (π‘«πŸ‘ β‹… π‘¬πŸ‘) β‹… (π‘¬πŸ’ β‹… 𝑴)

= 𝑰 β‹… (π‘¬πŸ’ β‹… 𝑴)

= π‘¬πŸ’ β‹… 𝑴

π‘«πŸ’ β‹… π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ β‹… π‘ͺ = π‘«πŸ’ β‹… (π‘¬πŸ’ β‹… 𝑴)

= (π‘«πŸ’ β‹… π‘¬πŸ’) β‹… 𝑴

= 𝑰 β‹… 𝑴

= 𝑴

Since matrix multiplication is associative, this means that 𝑴 = (π‘«πŸ’ β‹… π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ) β‹… π‘ͺ.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

207

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

d. Apply the method you devised in part (c) to your group’s message to verify that it works.

(π‘«πŸ’ β‹… π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ) = [

𝟏

πŸβˆ’

𝟏

𝟐

βˆ’πŸ‘

𝟐

πŸ“

𝟐

] β‹… [

𝟏

πŸ‘βˆ’

𝟏

πŸ‘

βˆ’πŸ

πŸ‘

πŸ’

πŸ‘

] β‹… [

𝟏

πŸ”πŸŽ

𝟎𝟏

πŸ‘

] β‹… [βˆ’πŸ βˆ’πŸ

𝟏𝟏

𝟐]

= [

𝟏

πŸ‘βˆ’

πŸ“

πŸ”

βˆ’πŸ’

πŸ‘

πŸπŸ‘

πŸ”

] β‹… [βˆ’

𝟏

πŸ”βˆ’

𝟏

πŸ”πŸ

πŸ‘

𝟏

πŸ”

] = [βˆ’

𝟏

πŸ‘βˆ’

πŸ•

πŸ‘πŸ”πŸ‘

𝟐

πŸ‘πŸ

πŸ‘πŸ”

]

So,

(π‘«πŸ’ β‹… π‘«πŸ‘ β‹… π‘«πŸ β‹… π‘«πŸ) β‹… π‘ͺ

= [βˆ’

𝟏

πŸ‘βˆ’

πŸ•

πŸ‘πŸ”πŸ‘

𝟐

πŸ‘πŸ

πŸ‘πŸ”

] β‹… [πŸπŸ“πŸŽπŸŽ πŸ‘πŸ–πŸ’πŸŽ 𝟎 πŸ‘πŸ’πŸ’πŸ’ πŸ‘πŸ’πŸπŸŽ πŸ’πŸ‘πŸ“πŸŽ 𝟎 πŸ’πŸ–πŸπŸ’ πŸ‘πŸ”πŸ•πŸ πŸ‘πŸ’πŸ•πŸ’

βˆ’πŸπŸ“πŸ—πŸ βˆ’πŸ”πŸ”πŸ”πŸŽ 𝟎 βˆ’πŸ“πŸ—πŸ•πŸ” βˆ’πŸ“πŸ—πŸ’πŸŽ βˆ’πŸ•πŸ“πŸ”πŸŽ 𝟎 βˆ’πŸ–πŸ‘πŸ–πŸ– βˆ’πŸ”πŸ‘πŸ•πŸ βˆ’πŸ”πŸŽπŸ’πŸ–]

= [πŸ’ πŸπŸ“ 𝟎 πŸπŸ’ πŸπŸ“ 𝟐𝟎 𝟎 πŸπŸ‘ πŸπŸ“ πŸπŸ–πŸπŸ– πŸπŸ“ 𝟎 𝟐𝟎 πŸπŸ“ πŸπŸ“ 𝟎 πŸπŸ‘ 𝟐𝟏 πŸ‘

]

This is the same decoded message that we found in Exercise 2, part (f).

Exercise 4 (Optional, 8 minutes)

The encoded phrase in this exercise is β€œRAMANUJAN.” Srinivasa Ramanujan (1887–1920) was a self-taught

mathematician from India who made significant contributions to many branches of mathematics, particularly analysis

and number theory, compiling thousands of mathematical results. Although he died young, he is widely considered to

be one of the greatest mathematicians of his time.

The original message is stored in matrix 𝑀 = [18 1 131 14 2110 1 14

], and the matrix used to encode the message is

𝐸 = [1 2 1

βˆ’1 0 21 1 βˆ’1

]. In this optional exercise, students need to reason through the process of encoding and decoding to

recover a missing entry in the decoding matrix when the encoding matrix is unknown. Use this exercise as an extension

for students who have finished the previous exercises quickly.

4. You received a coded message in the matrix π‘ͺ = [πŸ‘πŸŽ πŸ‘πŸŽ πŸ”πŸ—πŸ 𝟏 πŸπŸ“πŸ— πŸπŸ’ 𝟐𝟎

]. However, the matrix 𝑫 that will decode this

message has been corrupted, and you do not know the value of entry π’…πŸπŸ. You know that all entries in matrix 𝑫 are

integers. Using 𝒙 to represent this unknown entry, the decoding matrix 𝑫 is given by 𝑫 = [𝟐 𝒙 βˆ’πŸ’

βˆ’πŸ 𝟐 πŸ‘πŸ βˆ’πŸ βˆ’πŸ

]. Decode

the message in matrix π‘ͺ.

Decoding the message requires that we multiply 𝑫 β‹… π‘ͺ:

𝑫 β‹… π‘ͺ = [𝟐 𝒙 βˆ’πŸ’

βˆ’πŸ 𝟐 πŸ‘πŸ βˆ’πŸ βˆ’πŸ

] β‹… [πŸ‘πŸŽ πŸ‘πŸŽ πŸ”πŸ—πŸ 𝟏 πŸπŸ“πŸ— πŸπŸ’ 𝟐𝟎

]

= [πŸπŸ’ + πŸπ’™ πŸ’ + 𝒙 πŸ“πŸ– + πŸπŸ“π’™

𝟏 πŸπŸ’ 𝟐𝟏𝟏𝟎 𝟏 πŸπŸ’

]

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

208

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Since we know all entries are integers and that the entries represent letters, we know that

𝟎 ≀ πŸπŸ’ + πŸπ’™ ≀ πŸπŸ”

𝟎 ≀ πŸ’ + 𝒙 ≀ πŸπŸ”

𝟎 ≀ πŸ“πŸ– + πŸπŸ“π’™ ≀ πŸπŸ”.

Solving these inequalities gives

βˆ’πŸπŸ ≀ 𝒙 ≀ 𝟏

βˆ’πŸ’ ≀ 𝒙 ≀ 𝟐𝟐

βˆ’πŸ“πŸ–

πŸπŸ“β‰€ 𝒙 ≀ βˆ’

πŸ‘πŸ

πŸπŸ“.

Because we know that 𝒙 is an integer, the third inequality becomes βˆ’πŸ‘ ≀ 𝒙 ≀ βˆ’πŸ‘, so we know that 𝒙 = βˆ’πŸ‘. Then,

the decoded message is

𝑫 β‹… π‘ͺ = [πŸπŸ’ + 𝟐(βˆ’πŸ‘) πŸ’ + (βˆ’πŸ‘) πŸ“πŸ– + πŸπŸ“(βˆ’πŸ‘)

𝟏 πŸπŸ’ 𝟐𝟏𝟏𝟎 𝟏 πŸπŸ’

] ;

thus,

𝑫 β‹… π‘ͺ = [πŸπŸ– 𝟏 πŸπŸ‘πŸ πŸπŸ’ 𝟐𝟏𝟏𝟎 𝟏 πŸπŸ’

] ,

and the decoded message is β€œRAMANUJAN.”

Closing (3 minutes)

Ask students to write a brief answer to the question, β€œHow do matrix inverses make encoding and decoding messages

possible?” Then, have students share responses with a partner before sharing responses as a class.

How do matrix inverses make encoding and decoding messages possible?

If an 𝑛 Γ— 𝑛 matrix 𝐸 is invertible, then it can be used to encode a message. We store the message in a

matrix 𝑀, where 𝑀 has 𝑛 rows, and then encode it by multiplying 𝐸 β‹… 𝑀. To decode the message, we

multiply πΈβˆ’1 β‹… (𝐸 β‹… 𝑀) = (πΈβˆ’1 β‹… 𝐸) β‹… 𝑀 = 𝐼 β‹… 𝑀 = 𝑀.

Exit Ticket (4 minutes)

The message encoded in the problem in the Exit Ticket is β€œHYPATIA.” Hypatia (Hy-pay-shuh) of Alexandria (born

between 350 and 370 C.E., died 415 C.E.) is one of the earliest known female mathematicians. She was the head of the

Neoplatonic School in Alexandria, Egypt, and the head of the Library of Alexandria. She was murdered in a religious

conflict. None of her mathematical works have survived.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

209

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Name Date

Lesson 13: Using Matrix Operations for Encryption

Exit Ticket

Morgan used matrix 𝐸 = [1 βˆ’2

βˆ’1 3] to encode the name of her favorite mathematician in the message

βˆ’32, 7, 14, 1, 52, 2, βˆ’13, βˆ’1.

a. How can you tell whether or not her message can be decoded?

b. Decode the message, or explain why the original message cannot be recovered.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

210

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Exit Ticket Sample Solutions

Morgan used matrix 𝑬 = [𝟏 βˆ’πŸ

βˆ’πŸ πŸ‘] to encode the name of her favorite mathematician in the message

βˆ’πŸ‘πŸ, πŸ•, πŸπŸ’, 𝟏, πŸ“πŸ, 𝟐, βˆ’πŸπŸ‘, βˆ’πŸ.

a. How can you tell whether or not her message can be decoded?

Since the matrix 𝑬 has determinant 𝐝𝐞𝐭(𝑬) = πŸ‘ βˆ’ 𝟐 = 𝟏, we know that 𝐝𝐞𝐭(𝑬) β‰  𝟎, so then a decoding

matrix 𝑫 = π‘¬βˆ’πŸ exists.

b. Decode the message, or explain why the original message cannot be recovered.

First, we place the coded message into a 𝟐 Γ— πŸ’ matrix π‘ͺ. Using 𝑫 = π‘¬βˆ’πŸ = [πŸ‘ 𝟐𝟏 𝟏

], we have

𝑴 = 𝑫 β‹… π‘ͺ

= [πŸ‘ 𝟐𝟏 𝟏

] β‹… [βˆ’πŸ‘πŸ πŸ• πŸπŸ’ πŸπŸ“πŸ 𝟐 βˆ’πŸπŸ‘ βˆ’πŸ

]

= [βˆ’πŸ—πŸ” + πŸπŸŽπŸ’ 𝟐𝟏 + πŸ’ πŸ’πŸ βˆ’ πŸπŸ” πŸ‘ βˆ’ πŸβˆ’πŸ‘πŸ + πŸ“πŸ πŸ• + 𝟐 πŸπŸ’ βˆ’ πŸπŸ‘ 𝟏 βˆ’ 𝟏

]

= [πŸ– πŸπŸ“ πŸπŸ” 𝟏𝟐𝟎 πŸ— 𝟏 𝟎

] .

The decoded message is β€œHYPATIA.”

Problem Set Sample Solutions

Problems 1–4 are optional as they are practice on skills previously taught and assessed. Problems 6–9 allow students to

practice the use of matrix multiplication for coding and decoding messages.

1. Let 𝑨 = [𝟏 πŸ‘πŸ πŸ“

], 𝑩 = [βˆ’πŸ πŸ•πŸ‘ βˆ’πŸ’

], π‘ͺ = [βˆ’πŸ“ πŸ‘πŸ βˆ’πŸ

], 𝒁 = [𝟎 𝟎𝟎 𝟎

], and 𝑰 = [𝟏 𝟎𝟎 𝟏

]. Evaluate the following.

a. 𝑨 + 𝑩

[βˆ’πŸ πŸπŸŽπŸ“ 𝟏

]

b. 𝑩 + 𝑨

[βˆ’πŸ πŸπŸŽπŸ“ 𝟏

]

c. 𝑨 + (𝑩 + π‘ͺ)

[βˆ’πŸ” πŸπŸ‘πŸ• 𝟎

]

d. (𝑨 + 𝑩) + π‘ͺ

[βˆ’πŸ” πŸπŸ‘πŸ• 𝟎

]

e. 𝑨 + 𝑰

[𝟐 πŸ‘πŸ πŸ”

]

f. 𝑨 + 𝒁

[𝟏 πŸ‘πŸ πŸ“

]

g. 𝑨 β‹… 𝒁

[𝟎 𝟎𝟎 𝟎

]

h. 𝒁 β‹… 𝑨

[𝟎 𝟎𝟎 𝟎

]

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

211

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

i. 𝑰 β‹… 𝑨

[𝟏 πŸ‘πŸ πŸ“

]

j. 𝑨 β‹… 𝑩

[πŸ• βˆ’πŸ“πŸπŸ βˆ’πŸ”

]

k. 𝑩 β‹… 𝑨

[𝟏𝟐 πŸπŸ—βˆ’πŸ“ βˆ’πŸπŸ

]

l. 𝑨 β‹… π‘ͺ

[𝟏 𝟎𝟎 𝟏

]

m. π‘ͺ β‹… 𝑨

[𝟏 𝟎𝟎 𝟏

]

n. 𝑨 β‹… 𝑩 + 𝑨 β‹… π‘ͺ

[πŸ– βˆ’πŸ“πŸπŸ βˆ’πŸ“

]

o. 𝑨 β‹… (𝑩 + π‘ͺ)

[πŸ– βˆ’πŸ“πŸπŸ βˆ’πŸ“

]

p. 𝑨 β‹… 𝑩 β‹… π‘ͺ

[βˆ’πŸ’πŸ“ πŸπŸ”βˆ’πŸ”πŸ• πŸ‘πŸ—

]

q. π‘ͺ β‹… 𝑩 β‹… 𝑨

[βˆ’πŸ•πŸ“ βˆ’πŸπŸ•πŸ–πŸπŸ— πŸ”πŸ—

]

r. 𝑨 β‹… π‘ͺ β‹… 𝑩

[βˆ’πŸ πŸ•πŸ‘ βˆ’πŸ’

]

s. 𝐝𝐞𝐭(𝑨)

βˆ’πŸ

t. 𝐝𝐞𝐭(𝑩)

βˆ’πŸπŸ‘

u. 𝐝𝐞𝐭(π‘ͺ)

βˆ’πŸ

v. 𝐝𝐞𝐭(𝒁)

𝟎

w. 𝐝𝐞𝐭(𝑰)

𝟏

x. 𝐝𝐞𝐭(𝑨 β‹… 𝑩 β‹… π‘ͺ)

βˆ’πŸπŸ‘

y. 𝐝𝐞𝐭(π‘ͺ β‹… 𝑩 β‹… 𝑨)

βˆ’πŸπŸ‘

2. For any 𝟐 Γ— 𝟐 matrix 𝑨 and any real number π’Œ, show that if π’Œπ‘¨ = [𝟎 𝟎𝟎 𝟎

], then π’Œ = 𝟎 or 𝑨 = [𝟎 𝟎𝟎 𝟎

].

Let 𝑨 = [𝒂 𝒃𝒄 𝒅

]; then π’Œπ‘¨ = [π’Œπ’‚ π’Œπ’ƒπ’Œπ’„ π’Œπ’…

]. Suppose that π’Œπ‘¨ = [𝟎 𝟎𝟎 𝟎

].

Case 1: Suppose π’Œ β‰  𝟎. Then, π’Œπ’‚ = 𝟎, π’Œπ’ƒ = 𝟎, π’Œπ’„ = 𝟎, and π’Œπ’… = 𝟎; all imply that 𝒂 = 𝒃 = 𝒄 = 𝒅 = 𝟎. Thus, if

π’Œ β‰  𝟎, then 𝑨 = [𝟎 𝟎𝟎 𝟎

].

Case 2: Suppose that 𝑨 β‰  [𝟎 𝟎𝟎 𝟎

]. Then, at least one of 𝒂, 𝒃, 𝒄, and 𝒅 is not zero, so π’Œπ’‚ = 𝟎, π’Œπ’ƒ = 𝟎, π’Œπ’„ = 𝟎, and

π’Œπ’… = 𝟎 imply that π’Œ = 𝟎.

Thus, if π’Œπ‘¨ = [𝟎 𝟎𝟎 𝟎

], then either π’Œ = 𝟎 or 𝑨 = [𝟎 𝟎𝟎 𝟎

].

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

212

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

3. Claire claims that she multiplied 𝑨 = [βˆ’πŸ‘ 𝟐𝟎 πŸ’

] by another matrix 𝑿 and obtained [βˆ’πŸ‘ 𝟐𝟎 πŸ’

] as her result. What

matrix did she multiply by? How do you know?

She multiplied 𝑨 by the multiplicative identity matrix 𝑰 = [𝟏 𝟎𝟎 𝟏

]. Since the product is a 𝟐 Γ— 𝟐 matrix, we know that

𝑿 is a 𝟐 Γ— 𝟐 matrix of the form = [𝒂 𝒃𝒄 𝒅

] . Multiplying 𝑨 β‹… 𝑿 gives 𝑨 β‹… 𝑿 = [βˆ’πŸ‘π’‚ + πŸπ’„ βˆ’πŸ‘π’ƒ + πŸπ’…πŸŽπ’‚ + πŸ’π’„ πŸŽπ’ƒ + πŸ’π’…

]. Since

𝑨 β‹… 𝑿 = 𝑨, we have the following system of equations:

βˆ’πŸ‘π’‚ + πŸπ’„ = βˆ’πŸ‘

βˆ’πŸ‘π’ƒ + πŸπ’… = 𝟐

πŸŽπ’‚ + πŸ’π’„ = 𝟎

πŸŽπ’ƒ + πŸ’π’… = πŸ’.

The third and fourth equations give 𝒄 = 𝟎 and 𝒅 = 𝟏, respectively, and substituting into the first two equations gives

βˆ’πŸ‘π’‚ = βˆ’πŸ‘ and βˆ’πŸ‘π’ƒ + 𝟐 = 𝟐. Thus, 𝒂 = 𝟏 and 𝒃 = 𝟎, and the matrix 𝑿 must be 𝑿 = 𝑰.

4. Show that the only matrix 𝑩 such that 𝑨 + 𝑩 = 𝑨 is the zero matrix.

Let 𝑨 = [𝒂 𝒃𝒄 𝒅

] and 𝑩 = [𝒙 π’šπ’› π’˜

]; then, we have 𝑨 + 𝑩 = [𝒂 + 𝒙 𝒃 + π’šπ’„ + 𝒛 𝒅 + π’˜

], 𝒂 + 𝒙 = 𝒂, 𝒃 + π’š = 𝒃, 𝒄 + 𝒛 = 𝒄, and

𝒅 + π’˜ = 𝒅. In each case, solving for the elements of 𝑩, we find that 𝑩 = [𝟎 𝟎𝟎 𝟎

].

5. A 𝟐 Γ— 𝟐 matrix of the form [𝒂 𝟎𝟎 𝒃

] is a diagonal matrix. Daniel calculated

[𝟐 𝟎𝟎 𝟐

] β‹… [𝟐 πŸ‘πŸ“ βˆ’πŸ‘

] = [πŸ’ πŸ”πŸπŸŽ βˆ’πŸ”

]

[𝟐 πŸ‘πŸ“ βˆ’πŸ‘

] β‹… [𝟐 𝟎𝟎 𝟐

] = [πŸ’ πŸ”πŸπŸŽ βˆ’πŸ”

]

and concluded that if 𝑿 is a diagonal matrix and 𝑨 is any other matrix, then 𝑿 β‹… 𝑨 = 𝑨 β‹… 𝑿.

a. Is there anything wrong with Daniel’s reasoning? Prove or disprove that if 𝑿 is a diagonal 𝟐 Γ— 𝟐 matrix, then

𝑿 β‹… 𝑨 = 𝑨 β‹… 𝑿 for any other matrix 𝑨.

Yes, there is something wrong with Daniel’s reasoning. A single example does not establish that a statement

is true, and the example he calculated used a special case of a diagonal matrix in which the entries on the

main diagonal are equal.

If 𝑨 = [𝟏 πŸπŸ‘ πŸ’

] and 𝑿 = [𝟐 𝟎𝟎 πŸ‘

], then 𝑿 β‹… 𝑨 = [𝟐 πŸ’πŸ— 𝟏𝟐

] and 𝑨 β‹… 𝑿 = [𝟐 πŸ”πŸ” 𝟏𝟐

]. Thus, it is not true that

𝑿 β‹… 𝑨 = 𝑨 β‹… 𝑿 for all diagonal matrices 𝑿 and all other matrices 𝑨.

b. For πŸ‘ Γ— πŸ‘ matrices, Elda claims that only diagonal matrices of the form 𝑿 = [𝒄 𝟎 𝟎𝟎 𝒄 𝟎𝟎 𝟎 𝒄

] satisfy 𝑿 β‹… 𝑨 = 𝑨 β‹… 𝑿

for any other πŸ‘ Γ— πŸ‘ matrix 𝑨. Is her claim correct?

Elda is correct since 𝑿 = [𝒄 𝟎 𝟎𝟎 𝒄 𝟎𝟎 𝟎 𝒄

] = 𝒄𝑰. Then,

𝑿 β‹… 𝑨 = 𝒄𝑰 β‹… 𝑨 = 𝒄(𝑰 β‹… 𝑨) = 𝒄𝑨 = 𝑨𝒄 = (𝑨 β‹… 𝑰)𝒄 = 𝑨 β‹… (𝒄𝑰) = 𝑨 β‹… 𝑿 for all matrices 𝑨.

NYS COMMON CORE MATHEMATICS CURRICULUM M2 Lesson 13

PRECALCULUS AND ADVANCED TOPICS

Lesson 13: Using Matrix Operations for Encryption

213

This work is derived from Eureka Math β„’ and licensed by Great Minds. Β©2015 Great Minds. eureka-math.org This file derived from PreCal-M2-TE-1.3.0-08.2015

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

6. Calvin encoded a message using 𝑬 = [𝟐 𝟐

βˆ’πŸ πŸ‘], giving the coded message πŸ’, πŸπŸ–, πŸ’πŸ, πŸ“πŸ”, 𝟐, βˆ’πŸ”, βˆ’πŸ, πŸ“πŸ. Decode the

message, or explain why the original message cannot be recovered.

Putting the message in a 𝟐 Γ— πŸ’ matrix, we have π‘ͺ = [πŸ’ πŸπŸ– πŸ’πŸ πŸ“πŸ”πŸ βˆ’πŸ” βˆ’πŸ πŸ“πŸ

]. We can decode the message with

𝑫 = π‘¬βˆ’πŸ =𝟏

πŸ” βˆ’ (βˆ’πŸ)[πŸ‘ βˆ’πŸπŸ 𝟐

] = [

πŸ‘πŸ–

βˆ’πŸπŸ–

πŸπŸ–

πŸπŸ–

]. Then, the original message is found in message 𝑴:

𝑴 = 𝑫 β‹… π‘ͺ = [

πŸ‘

πŸ–βˆ’

𝟐

πŸ–πŸ

πŸ–

𝟐

πŸ–

] β‹… [πŸ’ πŸπŸ– πŸ’πŸ πŸ“πŸ”πŸ βˆ’πŸ” βˆ’πŸ πŸ“πŸ

] = [𝟏 𝟏𝟐 πŸπŸ” πŸ–πŸ 𝟐 πŸ“ 𝟐𝟎

] .

The original message is β€œALPHABET.”

7. Decode the message below using the matrix 𝑫 = [𝟏 𝟏 βˆ’πŸ

βˆ’πŸ 𝟎 𝟐𝟏 𝟐 𝟏

]:

𝟐𝟐, πŸπŸ•, πŸπŸ’, πŸ—, βˆ’πŸ, πŸπŸ’, βˆ’πŸ—, πŸ‘πŸ’, πŸ’πŸ’, πŸ”πŸ’, πŸ’πŸ•, πŸ•πŸ•.

The decoded message is found by multiplying [βˆ’πŸ’ βˆ’πŸ‘ πŸπŸ‘ 𝟐 βˆ’πŸ

βˆ’πŸ βˆ’πŸ 𝟏] β‹… [

𝟐𝟐 πŸπŸ• πŸπŸ’ πŸ—βˆ’πŸ πŸπŸ’ βˆ’πŸ— πŸ‘πŸ’πŸ’πŸ’ πŸ”πŸ’ πŸ’πŸ• πŸ•πŸ•

] = [πŸ‘ πŸπŸ– πŸπŸ“ πŸπŸ”πŸπŸŽ πŸπŸ“ πŸ• πŸπŸ–πŸ πŸπŸ” πŸ– πŸπŸ“

]. Then,

the message is β€œCRYPTOGRAPHY.”

8. Brandon encoded his name with the matrix 𝑬 = [𝟏 𝟏𝟐 𝟐

], producing the matrix π‘ͺ = [πŸ” πŸ‘πŸ‘ πŸπŸ“ πŸπŸ’πŸπŸ πŸ”πŸ” πŸ‘πŸŽ πŸπŸ–

]. Decode the

message, or explain why the original message cannot be recovered.

Brandon used a matrix that is not invertible. The original matrix cannot be recovered.

9. Janelle used the encoding matrix 𝑬 = [𝟏 𝟐𝟏 βˆ’πŸ

] to encode the message β€œFROG” by multiplying

π‘ͺ = [πŸ” πŸπŸ–πŸπŸ“ πŸ•

] β‹… [𝟏 𝟐𝟏 βˆ’πŸ

] = [πŸπŸ’ πŸ‘πŸŽπŸπŸ πŸ‘πŸ•

]. When Taylor decoded it, she computed

𝑴 = [βˆ’πŸ 𝟐𝟏 𝟏

] β‹… [πŸπŸ’ πŸ‘πŸŽπŸπŸ πŸ‘πŸ•

] = [𝟐𝟎 πŸ’πŸ’πŸ βˆ’πŸ•

]. What went wrong?

Janelle multiplied her matrices in the wrong order. When Janelle tried to decode the matrix π‘ͺ = [πŸπŸ’ πŸ‘πŸŽπŸπŸ πŸ‘πŸ•

] using the

decoding matrix 𝑫 = [𝟏 𝟐𝟏 βˆ’πŸ

]βˆ’πŸ

, she ended up calculating

𝑫 β‹… π‘ͺ = 𝑫 β‹… 𝑴 β‹… 𝑬 = π‘¬βˆ’πŸ β‹… 𝑴 β‹… 𝑬.

Because matrix multiplication is not commutative, π‘¬βˆ’πŸ β‹… 𝑴 β‹… 𝑬 β‰  𝑴, Taylor was unable to recover the original

message.