COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
GMIVOOONENORGREDNEY
|
|
GOGYOREOONVNDIEEMNR
|
|
GDRNVYEOMNGEOOOIERN
|
|
None of the above
|
Detailed explanation-1: -Yes, it is possible under certain circumstances to determine the encryption method used purely from ciphertexts.
Detailed explanation-2: -Ciphertext is encrypted text transformed from plaintext using an encryption algorithm. Ciphertext can’t be read until it has been converted into plaintext (decrypted) with a key. The decryption cipher is an algorithm that transforms the ciphertext back into plaintext.
Detailed explanation-3: -Decryption. Decrypting with the Hill cipher is built on the following operation: D(K, C) = (K-1 *C) mod 26 Where K is our key matrix and C is the ciphertext in vector form. Matrix multiplying the inverse of the key matrix with the ciphertext produces the decrypted plaintext.
Detailed explanation-4: -Also known as a cipher, algorithms are the rules or instructions for the encryption process. The key length, functionality, and features of the encryption system in use determine the effectiveness of the encryption. Decryption is the process of converting unreadable ciphertext to readable information.