edited by
7,593 views
6 votes
6 votes

In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)

$\text{WELCOME TO NETWORK SECURITY!}$

  1. $\text{WMEKREETSILTWETCOOCYONRU!}$
  2. $\text{EETSICOOCYWMEKRONRU!LTWET}$
  3. $\text{LTWETONRU!WMEKRCOOCYEETSI}$
  4. $\text{ONRU!COOCYLTWETEETSIWMEKR}$
edited by

3 Answers

Best answer
15 votes
15 votes

Write the plaintext in rows of width l(length of Key) and read it off by columns. Take the columns in a order defined by a key.

Here, l = 5,

Keyword   = L A Y E R
Key       = 3 1 5 2 4

Plaintext = W E L C O
            M E T O N
            E T W O R
            K S E C U
            R I T Y !    

Ciphertext: EETSI C00CY WMEKR ONRU! LTWET      ANS:(b)   .

selected by
2 votes
2 votes
Option (B) is correct.

KEY IS - LAYER

Arrange the Message according to the Key in Alphabetical order.
Answer:

Related questions

2 votes
2 votes
1 answer
1
Arjun asked Apr 22, 2018
2,334 views
Avalanche effect in cryptographyIs desirable property of cryptographic algorithmIs undesirable property of cryptographic algorithmHas no effect on encryption algorithmNon...
2 votes
2 votes
3 answers
2
Arjun asked Apr 22, 2018
3,996 views
What is one advantage of setting up a $\text{DMZ}$ (Demilitarized Zone) with two firewalls?You can control where traffic goes in the three networksYou can do statefull pa...
2 votes
2 votes
4 answers
3
Arjun asked Apr 22, 2018
14,234 views
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
2 votes
2 votes
1 answer
4
Arjun asked Apr 22, 2018
3,925 views
________ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.Hamming CodeCRCVRCNone of...