adplus-dvertising
frame-decoration

Question

These ciphers replace a character or characters with a different character or characters, based on some key.

a.

Polyalphabetic substitution based

b.

Transposition-based

c.

Substitution based

d.

Mono alphabetic substitution based

Answer: (d).Mono alphabetic substitution based

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. These ciphers replace a character or characters with a different character or characters, based on some key.

Similar Questions

Discover Related MCQs

Q. Encryption is the study of creating and using decryption techniques.

Q. A type of cipher that uses multiple alphabetic strings.

Q. An encryption technique with 2 keys is ______________

Q. In public key cryptography, a key that decrypts the message.

Q. DES stands for?

Q. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.

Q. Triple-DES has ______ keys.

Q. Encryption standard that is selected by the US government to replace DES.

Q. An electronic document that establishes your credentials when you are performing transactions.

Q. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Q. Which of the following is not a property of good encryption technique ?

Q. In which of the following encryption key is used to encrypt and decrypt the data ?

Q. Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________

Q. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?

Q. Which of the following requires no password travel across the internet ?

Q. Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?

Q. Which is the largest disadvantage of the symmetric Encryption?

Q. Which is the principle of the encryption using a key?