COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
a product cipher
|
|
a stream cipher
|
|
substitution
|
|
transposition
|
Detailed explanation-1: -The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of: transposition.
Detailed explanation-2: -Rail fence ciphers are examples of transposition ciphers: The characters in the plaintext message are permuted to create the ciphertext.
Detailed explanation-3: -Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT encrypted. Hashing is a one-way function (i.e., it is impossible to “decrypt” a hash and obtain the original plaintext value). Hashing is appropriate for password validation.
Detailed explanation-4: -A One Time Pad (OTP) is the only potentially unbreakable encryption method. Plain text encrypted using an OTP cannot be retrieved without the encrypting key. However, there are several key conditions that must be met by the user of a one time pad cipher, or the cipher can be compromised.