MICROPROCESSOR AND MICROCONTROLLER

COMPUTER SYSTEMS

ARCHITECTURE OF 8085

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A specific encryption code
A
Code
B
Cipher
C
Scramble
D
None of the above
Explanation: 

Detailed explanation-1: -For example, “GOOD DOG” can be encrypted as “PLLX XLP” where “L” substitutes for “O", “P” for “G", and “X” for “D” in the message. Transposition of the letters “GOOD DOG” can result in “DGOGDOO". These simple ciphers and examples are easy to crack, even without plaintext-ciphertext pairs.

Detailed explanation-2: -Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext using a key to determine how it is done.

Detailed explanation-3: -Caesar Cipher. In Caesar cipher, the set of plain text characters is replaced by any other character, symbols, or numbers. Monoalphabetic Cipher. Homophonic Substitution Cipher. Polygram Substitution Cipher. Polyalphabetic Substitution Cipher. Playfair Cipher. Hill Cipher.

There is 1 question to complete.