Once again, we remind the reader that not every system of equations can be solved by the matrix inverse method. Although the Gauss-Jordan method works for every situation, the matrix inverse method works only in cases where the inverse of the square matrix exists. In such cases the system has a unique solution.
We summarize our discussion in the following table.
The method for finding the inverse of a matrix
- Write the augmented matrix
.
- Write the augmented matrix in step 1 in reduced row echelon form.
- If the reduced row echelon form in 2 is
, then
is the inverse of
.
- If the left side of the row reduced echelon is not an identity matrix, the inverse does not exist.
The method for solving a system of equations when a unique solution exists
- Express the system in the matrix equation
.
- To solve the equation
, we multiply on both sides by
.
Application of matrices in cryptography
In this section, we see a use of matrices in encoding and decoding secret messages. There are many techniques used, but we will use a method that first converts the secret message into a string of numbers by arbitrarily assigning a number to each letter of the message. Next we convert this string of numbers into a new set of numbers by multiplying the string by a square matrix of our choice that has an inverse. This new set of numbers represents the coded message. To decode the message, we take the string of coded numbers and multiply it by the inverse of the matrix to get the original string of numbers. Finally, by associating the numbers with their corresponding letters, we obtain the original message.
In this section, we will use the correspondence where the letters A to Z correspond to the numbers 1 to 26, as shown below, and a space is represented by the number 27, and all punctuation is ignored.
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
Use the matrix
to encode the message: ATTACK NOW!
We divide the letters of the message into groups of two.
AT TA CK –N OW
We assign the numbers to these letters from the above table, and convert each pair of numbers into
matrices. In the case where a single letter is left over on the end, a space is added to make it into a pair.
So at this stage, our message expressed as
matrices is as follows.
Now to encode, we multiply, on the left, each matrix of our message by the matrix A. For example, the product of A with our first matrix is
By multiplying each of the matrices in
( I ) by the matrix A, we get the desired coded message given below.
Got questions? Get instant answers now! Got questions? Get instant answers now!
Decode the following message that was encoded using matrix
.
Since this message was encoded by multiplying by the matrix A in
[link] , we decode this message by first multiplying each matrix, on the left, by the inverse of matrix A given below.
For example,
By multiplying each of the matrices in
( II ) by the matrix
, we get the following.
Finally, by associating the numbers with their corresponding letters, we obtain the following.
And the message reads: KEEP IT UP.
Got questions? Get instant answers now! Got questions? Get instant answers now!