4,204 views

1 Answer

Best answer
13 votes
13 votes
Answer is A

See A=0 B=1 C=2 .......... you will get I = 8 ................

Now you just apply the cipher function character wise ,

BY THE WAY IN THE ABOVE FUNCTION M STANDS FOR  1 character one by one of input

So our first character is I

C( I ) = ( KM+13) MOD 26 =(7*8+13)MOD 26 = 17  and if you see 17 is R value

So just from the first character you can get answer RJCH
selected by
Answer:

Related questions

3 votes
3 votes
3 answers
1
makhdoom ghaya asked Apr 29, 2016
5,090 views
Which of the following encryption algorithms is based on the Feistal structure?Advanced Encryption StandardRSA public key cryptographic algorithmData Encryption standardR...
5 votes
5 votes
3 answers
2
makhdoom ghaya asked Apr 29, 2016
5,965 views
The protocol data unit for the transport layer in the internet stack isSegmentMessageDatagramFrame
2 votes
2 votes
2 answers
3
makhdoom ghaya asked Apr 27, 2016
8,327 views
A packet filtering firewall canDeny certain users from accessing a serviceBlock worms and viruses from entering the networkDisallow some files from being accessed through...
4 votes
4 votes
2 answers
4
makhdoom ghaya asked Apr 27, 2016
5,196 views
Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate?Solid bucket algorithmSpanning tree algorithmHocken helm algorith...