COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
LDWORLO____HEL
|
|
HLWLEOODL____R
|
|
HORE____LLWDLO
|
|
LOLWDE____LHOR
|
Detailed explanation-1: -If we look at the top line of our finished rail cipher, we can see it reads “HOL”. The second line reads“ELWRD”, and the third rail reads “LO”: Therefore, when we go to encrypt “HELLO WORLD” via a rail cipher, it will become “HOL ELWRD LO”!
Detailed explanation-2: -The Caesar cipher uses shift-by-3 rule for its encryption and decryption. However, the newly-developed algorithm uses keys between 0 and 25; it employs three different keys, one for each encryptionphase.
Detailed explanation-3: -In the rail fence cipher, the plain text is written downwards and diagonally on successive “rails” of an imaginary fence, then moving up when the bottom rail is reached. When the top rail is reached, the message is written downwards again until the whole plaintext is written out. The message is then read off in rows.