ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 48 - 112-51 discussion

Report
Export

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

A.
Substitution cipher
Answers
A.
Substitution cipher
B.
Streamn cipher
Answers
B.
Streamn cipher
C.
Transposition cipher
Answers
C.
Transposition cipher
D.
Block cipher
Answers
D.
Block cipher
Suggested answer: C

Explanation:

A transposition cipher is a type of cipher that encrypts a document by rearranging the same characters to produce the ciphertext. A transposition cipher does not change the identity or frequency of the characters, but only their position. A transposition cipher can use various methods to permute the characters, such as writing them in a grid and reading them in a different order, or shifting them along a rail fence pattern. A transposition cipher is a simple and fast algorithm, but it can be easily broken by frequency analysis or anagramming. A transposition cipher is the type of cipher employed by Kevin in the above scenario, as he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Reference:

Transposition cipher - Wikipedia

Network Security: Transposition Cipher Techniques - Coding Streets

Network Defense Essentials (NDE) | Coursera - Module 4: Cryptography Techniques

Columnar Transposition Cipher - GeeksforGeeks

asked 18/09/2024
Peter Lam
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first