Imagine you're a secret agent tasked with transmitting sensitive information securely. You've just
intercepted a message that reads, "Hacking is in mind." To protect its contents from prying eyes,
you decide to encrypt it using a sophisticated technique known as the Hill Cipher.
Your encryption key, "Hey Coding," holds the power to scramble the message into an unreadable
format. Once encrypted, the message becomes a puzzle, concealing its true meaning from anyone
who intercepts it. However, with the same key, the original message can be decrypted back to its
original form, allowing authorized individuals to understand its contents.
Your mission is clear: Encrypt the message "Hacking is in mind" using the Hill Cipher with the key
"Hey Coding" and then decrypt it back to its original form. This process will ensure the safety and
confidentiality of the information as it travels through the digital realm.