COMPUTER SYSTEMS
ARCHITECTURE OF 8085
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Code
|
|
Cipher
|
|
Scramble
|
|
None of the above
|
Detailed explanation-1: -For example, “GOOD DOG” can be encrypted as “PLLX XLP” where “L” substitutes for “O", “P” for “G", and “X” for “D” in the message. Transposition of the letters “GOOD DOG” can result in “DGOGDOO". These simple ciphers and examples are easy to crack, even without plaintext-ciphertext pairs.
Detailed explanation-2: -Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext using a key to determine how it is done.
Detailed explanation-3: -Caesar Cipher. In Caesar cipher, the set of plain text characters is replaced by any other character, symbols, or numbers. Monoalphabetic Cipher. Homophonic Substitution Cipher. Polygram Substitution Cipher. Polyalphabetic Substitution Cipher. Playfair Cipher. Hill Cipher.