Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

What is the basic unit of time measurement in Morse code transmission?(a) Dot duration(b) Dash Duration(c) Numeric Duration(d) Space DurationThe question was posed to me in an internship interview.This question is from Morse Code in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (a) Dot duration

Easy EXPLANATION - Dot duration is the basic unit of time measurement in Morse CODE TRANSMISSION. Both dot and DASH SIGNAL are used as time measurement in Morse code.

52.

Morse Code is named after which scientist?(a) Samuel F. B. Morse(b) Karl Morse(c) Judea Pearl(d) Daniel C. MorseThe question was posed to me in final exam.This intriguing question comes from Morse Code in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right option is (a) Samuel F. B. Morse

Best EXPLANATION: Morse Code is named after Samuel F. B. Morse who is the inventor of the telegraph. The best FIRST search algorithm USING heuristic evaluation rule or FUNCTION was proposed by an Israeli – American computer scientist and philosopher JUDEA Pearl.

53.

Which of the following is used as signal duration in Morse Code?(a) Dash(b) Forward Slash(c) Apostrophe(d) AmpersandThis question was posed to me by my college professor while I was bunking the class.I'd like to ask this question from Morse Code topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right OPTION is (a) DASH

To explain: The two signal DURATION used in Morse code are Dot and Dash. They are also called Dits and DAHS. While other symbols are expressed in terms of dots and dash.

54.

What is the length of the dot in Morse code?(a) 1 Unit(b) 7 Units(c) 5 Units(d) 3 UnitsThe question was asked during an interview.Question is from Morse Code topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (d) 3 Units

The explanation is: In Morse Code, the LENGTH of the SINGLE DOT is defined to be 1 Unit. While dash is defined to be 3 Unit. In Morse Code, the space between words is 7 unit.

55.

What will be the plain text corresponding to ciphered text “BKC” if the bifid cipher is used for encryption with key as “KEY” and period 5?(a) MSD(b) SRT(c) KVK(d) VVSI got this question in final exam.This question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT option is (c) KVK

Easiest explanation - The decryption in bifid cipher begins IDENTICALLY to encryption. Then we find the corresponding coordinates and then we get the plain text. So the plain text is “KVK”.

56.

What will be the plain text corresponding to cipher text “XKS” if the bifid cipher is used with key as “KEY” and period as 5?(a) IND(b) USA(c) RSA(d) AUSThis question was posed to me in an online quiz.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer» RIGHT answer is (b) USA

Best explanation: The decryption in BIFID cipher BEGINS identically to encryption. Then we find the corresponding COORDINATES and then we GET the plain text. So the plain text is “USA”.
57.

What will be the ciphered text corresponding to “ALGORITHM” if bifid cipher is used for encryption with key as “KEY” with a period as 5?(a) SBPISZTKZH(b) PLNSOWGKQM(c) SELFQEXBHM(d) YFSGWNFBWThe question was posed to me during an online exam.Query is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (d) YFSGWNFBW

Explanation: For encrypting the plain text using bifid CIPHER we first form the polybius square with the HELP of given key. After this, the plain text is divided into BLOCKS of length 5 and corresponding coordinates are NOTED. So the corresponding cipher text would be “YFSGWNFBW”.

58.

What will be the ciphered text corresponding to “SANFOUNDRY” if bifid cipher is used for encryption with key as “KEY” with period as 5?(a) SBPISZTKZH(b) PLNSOWGKQM(c) SELFQEXBHM(d) YFSGWNFBWThis question was posed to me in an interview for internship.The doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (b) PLNSOWGKQM

Easy explanation - For ENCRYPTING the plain text using BIFID CIPHER we first form the polybius SQUARE with the help of given key. After this, the plain text is divided into blocks of length 5 and CORRESPONDING coordinates are noted. So the corresponding cipher text would be “PLNSOWGKQM”.

59.

Bifid square combines autokey square with transposition.(a) true(b) falseThe question was asked during an interview.Origin of the question is Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (B) false

For EXPLANATION: Bifid SQUARE COMBINES polybius square with TRANSPOSITION. So the given statement is false.

60.

Trifid cipher encrypts the plain text by using bifid cipher twice.(a) true(b) falseI got this question in unit test.This interesting question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (b) false

The best I can EXPLAIN: Trifid CIPHER is a variation of BIFID cipher. The only difference between them is that trifid cipher uses a 3×3 KEY SQUARE instead of 5×5 square.

61.

Bifid cipher combines transposition with which of the following cipher?(a) Polybius square cipher(b) Playfair cipher(c) gronsfeld cipher(d) trifid cipherThis question was posed to me in final exam.This is a very interesting question from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer» CORRECT ANSWER is (a) Polybius square cipher

The BEST explanation: Bifid cipher COMBINES polybius square cipher with transposition. It USES fractionation to obtain diffusion.
62.

Which of the following cipher uses polybius square?(a) bifid cipher(b) beaufort cipher(c) trithemius cipher(d) gronsfeld cipherThe question was asked by my school teacher while I was bunking the class.Enquiry is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (a) bifid cipher

Easiest EXPLANATION - Bifid cipher uses POLYBIUS square for ENCRYPTING the PLAIN text. Bifid cipher combines polybius square cipher with TRANSPOSITION.

63.

What is the period in bifid cipher?(a) length of blocks in which the plain text is divided before encryption(b) number of letters after which the key is repeated(c) number of blocks into which the plain text is divided before encryption(d) number of keys used for encryptionThe question was asked in an online interview.This is a very interesting question from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (a) length of BLOCKS in which the plain text is divided before encryption

The best EXPLANATION: POLYBIUS SQUARE is similar to substitution cipher. It is also KNOWN by the name of Polybius checkboard.

64.

What will be the plain text corresponding to cipher text “IWRWHS” if running key cipher is used with keyword as “SANFOUNDRY”?(a) SECRET(b) QWERTY(c) INDIAN(d) FRIENDI got this question during an online interview.Origin of the question is Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (b) QWERTY

Easy explanation - RUNNING KEY cipher is a TYPE of poly alphabetic SUBSTITUTION which uses tabula recta for MAKING substitutions in the plain text. Using the table we find the plain text to be “QWERTY”.

65.

What will be the ciphered text corresponding to “ALGORITHM” if running key cipher is used for encryption with keyword as “DATASTRUCTURE”?(a) LDJOZOBBK(b) DLZOJBKBO(c) ZOLDJBKBO(d) OLZBJDKBOI got this question in an online quiz.Origin of the question is Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer» RIGHT choice is (b) DLZOJBKBO

To explain: Encryption in RUNNING key cipher takes place exactly as in vigenere cipher if we don’t INCLUDE the indicator BLOCK. So by USING the tabula recta we can find the encrypted text which is “DLZOJBKBO”.
66.

What will be the ciphered text corresponding to “SANFOUNDRY” if running key cipher is used for encryption with keyword as “ONCEUPONATIME”?(a) GNPJIJBQRR(b) GNPIJJBRRQ(c) GPNJJOBQRR(d) GJJNPOBQRIThe question was asked in quiz.My query is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (a) GNPJIJBQRR

For explanation: ENCRYPTION in running KEY cipher TAKES place exactly as in vigenere cipher if we don’t INCLUDE the indicator block. So by using the tabula recta we can find the ENCRYPTED text which is “GNPJIJBQRR”.

67.

Running key cipher is a variation of?(a) vigenere cipher(b) autokey cipher(c) hill cipher(d) route cipherThis question was addressed to me in final exam.I'd like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (a) vigenere CIPHER

Best explanation: Vigenere cipher is a variation of vigenere cipher. The only difference between them is that in vigenere cipher a RANDOM KEY is chosen WHEREAS in running key cipher key is chosen from a book or a text.

68.

Running key cipher is a transposition cipher.(a) true(b) falseI had been asked this question during a job interview.The origin of the question is Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Right option is (b) false

To explain: RUNNING key cipher is a POLY alphabetic SUBSTITUTION cipher. Encryption is DONE by using TABULA recta.

69.

What will be the plain text corresponding to cipher text “KEPWSN” if running key cipher is used with keyword as “SANFOUNDRY”?(a) SECRET(b) QWERTY(c) INDIAN(d) FRIENDI got this question in my homework.Enquiry is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (a) SECRET

Easiest explanation - Running key cipher is a type of poly ALPHABETIC SUBSTITUTION which uses tabula RECTA for MAKING substitutions in the plain text. Using the table we find the plain text to be “SECRET”.

70.

Running key cipher is harder to decipher than keyword cipher.(a) true(b) falseThe question was posed to me during an online exam.My doubt is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (a) true

Explanation: Keyword cipher is less SECURE than running key cipher. It is due to the FACT that keyword cipher is mono ALPHABETIC and thus can be cracked using frequency ANALYSIS. But running key cipher being a poly alphabetic cipher is harder to crack.

71.

Tabula recta consists of _______________(a) 26 rows and 26 columns(b) 26 rows and 1 column(c) 1 row and 26 columns(d) 27 rows and 27 columnsThis question was posed to me in a job interview.The doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right ANSWER is (a) 26 rows and 26 columns

Easy EXPLANATION - Encryption of plain TEXT using running key cipher is done by making USE of tabula recta. It consists of 26 rows and 26 columns which have ALPHABETS written 26 times. These are shifted towards left after each row.

72.

Which of the following is a difference between running key cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas running key cipher is mono alphabetic(c) in vigenere cipher the key is repeated whereas in running key cipher key is not repeated(d) vigenere cipher was used in ancient time whereas running key cipher is used in modern worldThe question was asked in examination.This intriguing question comes from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer» CORRECT choice is (c) in vigenere CIPHER the key is repeated whereas in RUNNING key cipher key is not repeated

Easy explanation - In running key cipher key is not repeated UNLIKE vigenere cipher. They both use the same table for encryption.
73.

Which of the following cipher uses a key book or a key text instead of a keyword?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) affine cipherThe question was posed to me in final exam.The query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (c) running key cipher

The EXPLANATION is: Running key cipher is a poly ALPHABETIC cipher. It USES a key book or key text instead of a KEYWORD which is agreed by both PARTIES before encryption takes place.

74.

Encryption in running key cipher is done using _______________(a) running key table(b) vigenere cycle(c) tabula recta(d) any table provided by the person performing the encryptionI have been asked this question in an online quiz.Question is taken from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct ANSWER is (c) tabula RECTA

The BEST explanation: Encryption of plain text in RUNNING key cipher is done by making use of tabula recta. The same table is also USED for encryption in vigenere cipher.

75.

Running key cipher is an example of _______________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThis question was posed to me by my college director while I was bunking the class.My enquiry is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (b) poly-ALPHABETIC cipher

The explanation is: Running key cipher is a SUBSTITUTION cipher. It falls under the category of poly alphabetic cipher as it uses MULTIPLE substitutions at different positions in order to cipher the PLAIN text.

76.

What is the significance of indicator block in running key cipher?(a) it helps in encryption(b) it strengthens the cipher(c) it gives information regarding the book/text from where the key is taken(d) it makes encryption easyI have been asked this question by my college director while I was bunking the class.My question is taken from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (c) it gives INFORMATION regarding the book/text from where the KEY is taken

Best explanation: The purpose of having an indicator block in running key cipher is to GIVE information to the receiver about the source of a key being used. It is USUALLY included in the second last block of the message.

77.

What will be the encrypted text corresponding to plain text “SAN” using standard polybius square cipher?(a) 431133(b) 341133(c) 441133(d) 114433This question was posed to me in an interview.My question is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (a) 431133

The BEST EXPLANATION: For encrypting using polybius square cipher we have to use the table which is shown below and write (row, col) coordinates corresponding to each letter.

1 2 3 4 5

1 A B C D E

2 F G H I/J K

3 L M N O P

4 Q R S T U

5 V W X Y Z

So the ciphered text will be “431133”.

78.

What will be the plain text corresponding to ciphered text “134325” if standard polybius square cipher is used for encryption?(a) SRH(b) CSK(c) RCB(d) KKRThis question was posed to me in an online quiz.I want to ask this question from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (b) CSK

For explanation: For decoding ciphered text we have to USE the polybius SQUARE in and find out the letters corresponding to each pair of coordinate. So in this case the PLAIN text is FOUND to be “CSK”.

79.

Which of the following cipher uses polybius square cipher in its first step of encrypting data?(a) Autokey cipher(b) One time pad cipher(c) ADFGVX cipher(d) Rail fence cipherThe question was asked in an interview for internship.I want to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (c) ADFGVX cipher

Easy explanation - ADFGVX cipher uses POLYBIUS square cipher in its FIRST STEP of encrypting DATA. It uses a 6 X 6 version of polybius square.

80.

Polybius square cipher is less susceptible to frequency analysis.(a) true(b) falseI got this question in an interview for job.The query is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct OPTION is (b) false

The explanation is: Polybius square cipher is CLOSELY RELATED to mono alphabetic cipher. Thus it is quite vulnerable to FREQUENCY analysis MUCH like any other mono alphabetic cipher.

81.

Auto key cipher is more secure than polybius square cipher?(a) true(b) falseThis question was addressed to me at a job interview.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (a) true

Easiest explanation - Polybius SQUARE is CLOSELY related to MONO alphabetic substitution CIPHER and thus is more vulnerable to frequency analysis. Whereas polybius square being a poly alphabetic cipher is less vulnerable to frequency analysis and so is more secure.

82.

Which two English letters are usually combined in polybius table?(a) A and B(b) Y and Z(c) I and J(d) J and KThis question was posed to me by my college director while I was bunking the class.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (C) I and J

The best explanation: The usual size of poybius SQUARE for encrypting English ALPHABETS is 5 X 5. Usually, I and J are combined so as to fit all English LETTERS in this table.

83.

Polybius square cipher is most closely related to?(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThe question was asked in examination.My question is based upon Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (a) MONO-alphabetic CIPHER

Best EXPLANATION: Polybius square cipher is much like any mono alphabetic cipher. It is because it applies a fixed SUBSTITUTION to the letters present in plain TEXT.

84.

What is the usual size of polybius square used for encrypting English alphabets?(a) 5 X 5(b) 6 X 6(c) 26 X 26(d) 25 X 25I have been asked this question during a job interview.This is a very interesting question from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (a) 5 X 5

For explanation: The usual size of poybius square for ENCRYPTING English alphabets is 5 X 5. Usually, I and J are COMBINED so as to fit all English letters in this table.

85.

Which of the following is made possible by the use of Polybius square?(a) To represent the plain text by smaller set of symbols(b) To represent the plain text by larger set of symbols(c) To represent the plain text by the letters of some other language(d) To represent the plain text by the same set of symbolsThe question was posed to me in a job interview.My question is based upon Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct ANSWER is (a) To represent the plain text by smaller set of symbols

Explanation: Polybius SQUARE is SIMILAR to substitution cipher. Polybius square allows us to cipher the plain text in such a way that a minimum NUMBER of symbols are used in the ENCRYPTED text.

86.

How many keys are required for encryption and decryption of data when we use asymmetric cipher?(a) 0(b) 1(c) 2(d) 3The question was asked during an internship interview.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (c) 2

Explanation: ASYMMETRIC cipher makes USE of 2 keys for the PURPOSE of encryption. ONE is known as public key whereas other is called PRIVATE key.

87.

Polybius square is also known by the name of?(a) Polybius checkboard(b) Polybius table(c) Ploybius board(d) Ploybius keypadI have been asked this question during an online exam.My query is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer» CORRECT option is (a) Polybius checkboard

Explanation: Polybius SQUARE is similar to substitution cipher. It is also known by the NAME of Polybius checkboard.
88.

What will be the plain text corresponding to cipher text “RVUVMF” if trithemius cipher is used?(a) RABBIT(b) RUSSIA(c) RANGER(d) FRIENDI got this question by my college director while I was bunking the class.My question is taken from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (b) RUSSIA

Easiest EXPLANATION - Trithemius CIPHER is a TYPE of poly alphabetic SUBSTITUTION which uses tabula recta for making substitutions in the plain text. Using the table and using the key as ABCDEFGHIJKLMNOPQRSTUVWXYZ we find the plain text to be “RUSSIA”.

89.

What will be the ciphered text corresponding to “ALGORITHM” if trithemius cipher is used for encryption?(a) BNJSWOAPV(b) BMHPSJUIN(c) AMIRVNZOU(d) MBPHJSNIUI have been asked this question by my school principal while I was bunking the class.Question is taken from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» CORRECT option is (C) AMIRVNZOU

For explanation: Encryption in trithemius cipher takes place exactly as in vigenere cipher if we CONSIDER the key to be ABCDEFGHIJKLMNOPQRSTUVWXYZ. So by using the tabula recta we can find the encrypted TEXT which is “AMIRVNZOU”.
90.

What will be the ciphered text corresponding to “SANFOUNDRY” if trithemius cipher is used for encryption?(a) SBPISZTKZH(b) TCQJTAULAI(c) TBOGPVOESZ(d) SPBISZKTZHThe question was asked in semester exam.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (a) SBPISZTKZH

Best explanation: Encryption in trithemius CIPHER takes place exactly as in VIGENERE cipher if we CONSIDER the key to be ABCDEFGHIJKLMNOPQRSTUVWXYZ. So by using the tabula recta we can FIND the ENCRYPTED text which is “SBPISZTKZH”.

91.

Which of the following cipher is easiest to crack?(a) vigenere cipher(b) running key cipher(c) trithemius cipher(d) all are equally secureI had been asked this question in examination.My question comes from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (c) trithemius cipher

The best explanation: Trithemius cipher is a special case of vigenere cipher and RUNNING key cipher is a variation of vigenere cipher. If ONE FIGURES out that the cipher being used is trithemius then it is very easy to crack, UNLIKE running key and vigenere ciphers as these use a SECRET key for encryption.

92.

Trithemius cipher is harder to crack than caesar cipher.(a) True(b) FalseI got this question in examination.I'd like to ask this question from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Correct CHOICE is (a) True

Easy explanation - TRITHEMIUS cipher uses a more COMPLEX VERSION of caesar cipher. So trithemius cipher is HARDER to crack as compared to caesar cipher.

93.

What will be the plain text corresponding to cipher text “ACCFYX” if trithemius cipher is used?(a) ABACUS(b) ABROAD(c) ABRUPT(d) ABUSEDI had been asked this question during an interview.Enquiry is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (a) ABACUS

For explanation: Running key cipher is a TYPE of POLY alphabetic substitution which USES tabula recta for making SUBSTITUTIONS in the plain text. Using the table and key as ABCDEFGHIJKLMNOPQRSTUVWXYZ we find the plain text to be “ABACUS”.

94.

Trithemius cipher is harder to crack than vigenere cipher.(a) true(b) falseThe question was posed to me in examination.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Right OPTION is (b) false

The explanation is: Trithemius CIPHER is a special CASE of vigenere cipher with ABCDEFGHIJKLMNOPQRSTUVWXYZ as key. So trithemius cipher is easier to crack as the key being used remains same every time.

95.

Trithemius cipher is a special case of _______________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherThis question was addressed to me in an internship interview.My question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (b) vigenere cipher

The explanation is: Trithemius cipher is a special case of vigenere cipher. The DIFFERENCE is that vigenere cipher USES a different key EVERY TIME but a fixed key is used by trithemius cipher.

96.

Which of the following cipher require the use of tabula recta?(a) hill cipher(b) route cipher(c) rail fence cipher(d) trithemius cipherI got this question in my homework.This interesting question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (d) trithemius cipher

Explanation: Ciphers LIKE running key cipher, vigenere cipher, trithemius cipher, etc. makes use of TABULA recta. WHEREAS hill cipher, rail fence cipher and ROUTE cipher does not require tabula recta for encryption of plain TEXT.

97.

Which of the following is a difference between trithemius cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas running key cipher is mono alphabetic(c) vigenere cipher uses a key whereas no key is required for using trithemius cipher(d) vigenere cipher is substitution cipher whereas trithemius cipher is transposition cipherThe question was asked during an interview.Enquiry is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer» RIGHT option is (C) vigenere cipher USES a key WHEREAS no key is required for using trithemius cipher

Best explanation: Trithemius cipher is a special case of vigenere cipher. The difference is that vigenere cipher uses a different key every TIME but a fixed key is used by trithemius cipher.
98.

Which of the following is a modified version of Caesar cipher?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) trithemius cipherI got this question by my college director while I was bunking the class.I need to ask this question from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct ANSWER is (d) TRITHEMIUS cipher

The best explanation: If in caesar cipher we consider a shift that increases by 1 by each LETTER starting at 0 then it is EQUIVALENT to trithemius cipher. So trithemius cipher is a special case of caesar cipher.

99.

Encryption in trithemius cipher is done using _______________(a) trithemius table(b) vigenere cycle(c) tabula recta(d) any table provided by the person performing the encryptionThe question was asked in an interview for internship.Asked question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (C) tabula recta

Best explanation: Encryption of plain text in trithemius cipher is DONE by MAKING use of tabula recta. The same table is also USED for encryption in VIGENERE cipher and running key cipher.

100.

Trithemius cipher is an example of ________________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in homework.Enquiry is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (B) POLY-alphabetic cipher

Easiest explanation - Trithemius cipher is a substitution cipher. It falls under the CATEGORY of poly alphabetic cipher as it uses multiple substitutions at different positions in ORDER to cipher the plain text.