adplus-dvertising
frame-decoration

Question

The ROT13 caesar cipher system has an offset of ___________

a.

13

b.

45

c.

71

d.

37

Posted under Discrete Mathematics

Answer: (a).13

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The ROT13 caesar cipher system has an offset of ___________

Similar Questions

Discover Related MCQs

Q. In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?

Q. To encrypt a message _______ is used on the character’s positions.

Q. The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value of Euler’s totient function ϕ(n) for calculating the private key of the user?

Q. Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text?

Q. There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose?

Q. In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.

Q. How many bits of message does the Secure Hash Algorithm produce?

Q. _______ is an example of asymmetric ciphers.

Q. There is no secret key in case of ____________

Q. Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011.

Q. Electronic Code Book process is used in ________

Q. ______ uses the concept of pseudo-random sequence.

Q. How many bits are there for random bits and error detection bits in the case of DES block ciphers?

Q. What are the steps in the Feistel function?

Q. What type of algorithm does AES encryption use?

Q. What is the block size of blowfish block cipher?

Q. In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message?