COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Encrypt “cryptosystem” with key 7 using Shift Cipher
A
jygwhvjfkalt
B
jyfuarzfzopt
C
jyfwavzfzalt
D
jyfwaerfzret
Explanation: 

Detailed explanation-1: -What we have done can be summarized by the formula x ≡ 9(y + 19) (mod 26), or, more simply, by x ≡ 9y + 15 (mod 26), (note 9 · 19 ≡ 15 (mod 26)). Here (9, 15) is the decryption key for the affine cipher with encryption key (3, 7).

Detailed explanation-2: -Use the shift cipher with key = 15 to decrypt the message “WTAAD.” A transposition cipher reorders ( t ) b l i bl k f (permutes) symbols in a block of symbols.

Detailed explanation-3: -How to decrypt using the shift cipher? Decryption requires knowing the shift used and the alphabet. Take a letter in position N in the alphabet that has been encrypted by a shift of X, it must be shifted by-X to return to its original position N-X .

There is 1 question to complete.