Here's the question bank on all the computer networks topics.
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encryption)WELCOME TO NETWORK SECURITY !
transposition ciphers conceptWrite the plain text in rows of width l and read it off by columns. Take the columns in an order defined by a key. [If you take the columns in their natural order”without using a key”, then the procedure amounts to a path transposition. The Scytale corresponds to such a columnar transposition with a trivial key.]Explanation:l = 5;KeywordL A Y E RKey 3 1 5 2 4Plaintext = WELCOMETONETWORKSECURITY!now read it column-wise based on the key, So generated ciphertext isEETSI C00CY WMEKR ONRU! LTWET.The correct answer is option 2
Scan QR code to download our App for
more exam-oriented questions
OR
To get link to download app