COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
2
|
|
3
|
|
4
|
|
5
|
|
6
|
Detailed explanation-1: -For example, if the key is 3, the letter A, which is the first letter in the alphabet, is substituted by the letter D, which is the fourth letter in the alphabet. B (the second letter) is replaced by E (the fifth letter), and so on.
Detailed explanation-2: -Because there are only 25 possible keys, Caesar ciphers are very vulnerable to a “brute force” attack, where the decoder simply tries each possible combination of letters.
Detailed explanation-3: -Choose a value to shift the alphabet by. Make a table where the top row contains letters in standard alphabetical order, and the bottom row is the new shifted alphabet. Encode the message by exchanging each letter in the message with the equivalent shifted letter. More items