You are on page 1of 14

Mathletes...

Assemble
Miss. Van Spronsen, Mathland Director
Chapter 1: Mission
The Mission
Agents, this is headquarters, I am glad you have
arrived we have just received warning that there has
been a breach in sector Q14. The bank securing all
of the documents concerning the creation and
continued development of chocolate has been
sabotaged and a bomb placed in the safe! The
bandits have reset the combination on the lock and
it is up to you to crack the code and disarm the
bomb before it is too late. The world is counting on
you to save the chocolate, if not this delectable
treat will be lost for all future generations. Good
luck!
AGENTS! The following pages contain important
information for cracking the case! Remember the
World is counting on you to save Chocolate! The
safe is due to explode in exactly 2 days. Your
mission, if you should choose to accept it, is to
crack the code on the safe so the bomb can be
disarmed. We have determined that the locking
mechanism for the safe has been set using
Encoded Matrices. We have intercepted the vital
encryption matrix and coded message but it is up
to you to determine how to crack the code. Good
luck Mathletes!
Section 1
DETAILS:
1.Bank Location: 314 2nd
Street, Flatland, PI
2.Q14-Everything Delicious
3.Saboteurs: The
Notorious e Crew
1.Last Seen: 2/17/15
TOP SECRET
2
3
In order to crack the code on the safe
and save the chocolate you must rst
have a strong background in matrix
cryptography. Throughout the coming
pages you will nd key information to
assist in your discovery and aid in your
detective skills. You must complete each
of the steps, making careful
observations and notes along the way.
Using Notability download the
Preparation Note Guide from Miss Vs
site. Complete each step in the process.
You will be required to submit all of your
work in your nal report to headquarters
so keep track of your steps along with
the nal product!
Chapter 2
The
Knowledge
In order to crack the code on the safe and save the
chocolate you must rst have a strong background
in matrix cryptography. Throughout the coming
pages you will nd key information to assist in your
planning and strategy. Remember to complete all
parts of the preparation process and submit your
results to headquarters before moving on!
Introduction To
Cryptography:
Watch the following clips and read the
articles to discover more about secret
codes, their origin and purpose
throughout history.
1. What is Cryptology?
2. Cryptology Application
3. Cryptolgoy with Matrices
5
Review 2.1 Cryptology
Check Answer
Encryption is the transformation of data into an
unreadable form. Decryption is the of
encryption.
A. Reverse
B. Inverse
C. Readable Form
D. Opposite
Inverse
2x2 Matrix
1/determinant
Interactive 2.1 Inverse of a 2x2 Matrix
Finding the Inverse of a
Matrix:
Read through the following articles to
learn how to nd the inverse of a matrix.
1. Inverse of a Matrix
2. Inverse of Matrix-Part 2
TASK: In your Preparation Guide provide
a step by step procedure for nding the
inverse of a 2x2 square matrix using a
determinant.
7
Watch this video for a step by step example of nding an
inverse of a 2x2 Matrix.
EXAMPLE: Inverse of a 2x2 Matrix
Watch this video for a step by step example of nding an
inverse of a 3x3 Matrix.
EXAMPLE: Inverse of a 3x3 Matrix
TASK: Time to Practice Agents! Download the following practice
problems into Notability and nd the inverses.(The answer key is
attached so you need to show work to receive credit!)
EXAMPLES OF INVERSES:
Watch the following videos and complete the task at the bottom.
Chapter 3
CRACK THE
CODE!
Mathletes it is time! On the following page you will
nd the matrix and coding scheme that we were
able to intercept from the thieves. Remember we
will only have one chance to crack the safe so
choose your solution wisely! After you have found
the code, you must re code the bank using a
di"erent matrix. Good luck Agents!
STEP 1: Crack the Code on the Safe!
Agents, time is running out to crack the safe and disarm the bomb in sector Q14. The following information
has been intercepted by our spies. They were able to retrieve the coded message and the Encryption
Matrix. It is up to you to determine the Decryption Matrix and nd the original message! To crack the code
divide the coded message up into 1x3 matrices and multiply on the right by the inverse of the encryption
CODED MESSAGE: 13 -26 21 33 -53 -12 18 -23 -42 5 -20 56 -24 23 77
Encryption Matrix: Intercepted from Enemy Agent 748
Number/Letter Association: 0=Space, 1=A, 2=B, 3=C, etc.
STEP 2: RECODE THE SAFE!
Excellent work agents, now you need to reset the safe! In order to fool the
enemy we are going to encode their same secret message using a di"erent
encryption matrix.
TASK: Create a 3x3 invertible Matrix to be used for encoding the
message. Prove that the matrix is invertible. Encode the enemys original
message through the new encryption and report back to headquarters!
Chapter 4
Report
Congratulations! You cracked the code and saved
the bank! Now it is time to write your o#cial report
to send back to Mathland headquarters. Please ll
out the attached paperwork and upload it to the
Mathlands Secret Agent Website (at times its Alias
is Blogger) under the title Matrix Cryptography.
Your report is due 2 days after you have cracked the
case!
12
REPORT DETAILS:
1.Ensure that each task has been
completed:
a.Notes on Inverse of Matrices using a
determinant
b.Practice Problems
c.Decryption Matrix(Crack the Code Step
1)
d.Hidden Message(Crack the Code Step 1)
e.Create your own Encryption Matrix(Crack
the Code Step 2)
f. Recoded Message using the New
Encryption Matrix(Crack the Code Step
2)
After you have completed each of these
steps. Assemble all of your work and
data into one nal document. Create or
nd an image for the report and write 2
paragraphs explaining how matrices play
a key role in cryptography.
Upon completion turn in your work to
your blog under the title Matrix
Cryptography.
Image 4.1 Lorem Ipsum dolor amet, consectetur

You might also like