NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Encrypt “cryptosystem” with key 7 using Shift Cipher
|
jygwhvjfkalt
|
|
jyfuarzfzopt
|
|
jyfwavzfzalt
|
|
jyfwaerfzret
|
Explanation:
Detailed explanation-1: -What we have done can be summarized by the formula x ≡ 9(y + 19) (mod 26), or, more simply, by x ≡ 9y + 15 (mod 26), (note 9 · 19 ≡ 15 (mod 26)). Here (9, 15) is the decryption key for the affine cipher with encryption key (3, 7).
Detailed explanation-2: -Use the shift cipher with key = 15 to decrypt the message “WTAAD.” A transposition cipher reorders ( t ) b l i bl k f (permutes) symbols in a block of symbols.
Detailed explanation-3: -How to decrypt using the shift cipher? Decryption requires knowing the shift used and the alphabet. Take a letter in position N in the alphabet that has been encrypted by a shift of X, it must be shifted by-X to return to its original position N-X .
There is 1 question to complete.