Question: Question 2: 3 marks Encrypt the plaintext NETWORK SECURITY using the following techniques: (It is necessary to fill in the tables with the corresponding substitutions
Question 2: 3 marks Encrypt the plaintext "NETWORK SECURITY" using the following techniques: (It is necessary to fill in the tables with the corresponding substitutions of all the letters) 1. Caesar Cinher. with Kev=10 Ciphertext: 2. Poly-alphabetic Cacsar Cipher, Key1 =3,Key2=7, the encryption sequence is the alternation of ciphering with Key1, then Key2, then Keyl Ciphertext: 3. Substitution Cipher with Keyshift Alphabet, suing the key "AURAK
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
