FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
On what principle did Julius Caesar’s cryptographic messages function?
A
Each alphabetic letter was replaced by a corresponding number
B
Each alphabetic letter was represented by a seemingly random symbol
C
Each alphabetic letter was shifted three places down in the alphabet
D
Each alphabetic letter was shifted 5 places up in the alphabet
Explanation: 

Detailed explanation-1: -The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters, historically three, as shown in Figure 5.1. The ciphertext can be decrypted by applying the same number of shifts in the opposite direction.

Detailed explanation-2: -How to encrypt using Caesar cipher? Example: Crypt DCODEX with a shift of 3 . To encrypt D, take the alphabet and look 3 letters after: G . So D is encrypted with G . To encrypt X, loop the alphabet: after X : Y, after Y : Z, after Z : A . So X is coded A .

Detailed explanation-3: -The Caesar Cipher technique is one of the earliest and simplest methods of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter with a fixed number of positions down the alphabet.

Detailed explanation-4: -A Caesar Shift cipher is a type of mono-alphabetic substitution cipher where each letter of the plain text is shifted a fixed number of places down the alphabet. For example, with a shift of 1, letter A would be replaced by letter B, letter B would be replaced by letter C, and so on.

Detailed explanation-5: -The Caesar Cipher is one of the simplest symmetric encryption techniques, and of course, one of the easiest to crack. Since then, cryptologists have invented many more symmetric encryption techniques, including the ones used today to encrypt data like passwords.

There is 1 question to complete.