So far as we know, no literature has dealt with
generation of a singular matrix. The main idea ofthis work is to present special properties identified
for forming a singular matrix so as to use it in the
proposed research related to information security.
The singular matrix formed is subject to various
properties of determinant just to verify whether it
has violated any of the determinant properties (see
section 1.1) and basic matrix arithmetic operations
(see section 3) to see whether the resultant matrix
satisfies the special properties.