COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
S-box
|
|
P-box
|
|
T-box
|
|
None of the ementioned
|
Detailed explanation-1: -Transposition ciphers rearrange characters or bits of plaintext to produce ciphertext.
Detailed explanation-2: -Secret key cryptography (symmetrical encryption): Both the sender and receiver must use the same key to encrypt and decrypt messages being sent. This imposes a security risk as we need to deliver the key to the recipient of the message in a secure way to make him/her able to decrypt the message.
Detailed explanation-3: -Explanation: Route cipher is a transposition cipher. It falls under the category of transposition cipher as it encrypts the plain text by rearranging its letters. 6. Which of the following ciphered text would have used transposition cipher for encryption of the plain text “SANFOUNDRY”?
Detailed explanation-4: -Substitution Ciphers. Substitution ciphers encrypt the plaintext by swapping each letter or symbol in the plaintext by a different symbol as directed by the key. Perhaps the simplest substitution cipher is the Caesar cipher, named after the man who used it.