COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Substitution
|
|
Transposition
|
|
Symmetric
|
|
Asymmetric
|
Detailed explanation-1: -Cryptography is the process of converting between readable text, called plaintext, and an unreadable form, called ciphertext . This occurs as follows: The sender converts the plaintext message to ciphertext. This part of the process is called encryption (sometimes encipherment ).
Detailed explanation-2: -Double Transposition consists of two applications of columnar transposition to a message. The two applications may use the same key for each of the two steps, or they may use different keys. Now number the letters in the keyword in alphabetical order.
Detailed explanation-3: -Examples of ciphers that combine fractionation and transposition include the bifid cipher, the trifid cipher, the ADFGVX cipher and the VIC cipher.
Detailed explanation-4: -Type of operations for transforming plaintext to ciphertext. All encryption algorithms are based on two general principles: Substitution: each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element, Transposition: elements in the plaintext are rearranged.