FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If you were to use a caeser cipher with a key of 3 shifts to the left, how would you encrypt the word:Cipher?
A
ZAMEBO
B
ZOMEBO
C
ZFMEBO
D
ZFMEBA
Explanation: 

Detailed explanation-1: -How to encrypt using Caesar cipher? Example: Crypt DCODEX with a shift of 3 . To encrypt D, take the alphabet and look 3 letters after: G . So D is encrypted with G . To encrypt X, loop the alphabet: after X : Y, after Y : Z, after Z : A . So X is coded A .

Detailed explanation-2: -The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three (A becoming D when encrypting, and D becoming A when decrypting) to protect messages of military significance.

Detailed explanation-3: -For example, if the key is 3, the letter A, which is the first letter in the alphabet, is substituted by the letter D, which is the fourth letter in the alphabet. B (the second letter) is replaced by E (the fifth letter), and so on.

There is 1 question to complete.