Question Bank - Computer Networks

Here's the question bank on all the computer networks topics.

In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encryption)WELCOME TO NETWORK SECURITY !

A.
WMEKREETSILTWETCOOCYONRU!
B.
EETSICOOCYWMEKRONRU!LTWET
C.
LTWETONRU!WMEKRCOOCYEETSI
D.
ONRU!COOCYLTWETEETSIWMEKR

Solution:

transposition ciphers conceptWrite the plain text in rows of width l and read it off by columns. Take the columns in an order defined by a key. [If you take the columns in their natural order”without using a key”, then the procedure amounts to a path transposition. The Scytale corresponds to such a columnar transposition with a trivial key.]Explanation:l = 5;KeywordL A Y E RKey 3 1 5 2 4Plaintext = WELCOMETONETWORKSECURITY!now read it column-wise based on the key, So generated ciphertext isEETSI C00CY WMEKR ONRU! LTWET.The correct answer is option 2

For more questions,

Click Here

Download Gyanm App

free current affairs for competitive exams

Scan QR code to download our App for
more exam-oriented questions

free current affairs for competitive exams

OR
To get link to download app

Thank you! Your submission has been received. You will get the pdf soon. Call us if you have any question: 9117343434
Oops! Something went wrong while submitting the form.