Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

151.

What will be the plain text corresponding to cipher text “ZEYQC” if autokey cipher is used with keyword as “SANFOUNDRY”?(a) INDIA(b) WORLD(c) HELLO(d) SECRETI have been asked this question by my school teacher while I was bunking the class.The above asked question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct OPTION is (c) HELLO

The best explanation: Autokey cipher is a TYPE of POLY alphabetic substitution which uses vigenere table for making SUBSTITUTIONS in the plain text after generating key USING plain text. Using the table we find the plain text to be “HELLO”.

152.

Autokey cipher is harder to crack than keyword cipher.(a) true(b) falseThe question was posed to me in homework.This key question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (a) true

The best explanation: Keyword CIPHER is less SECURE than Autokey cipher. It is due to the fact that keyword cipher is MONO alphabetic and thus can be cracked USING frequency analysis. But Autokey cipher being a poly alphabetic cipher cannot be cracked using this METHOD.

153.

Autokey cipher is closely related to ___________(a) Vigenere cipher(b) Hill cipher(c) Play fair cipher(d) Rotor cipherThis question was addressed to me in unit test.This intriguing question comes from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct OPTION is (a) Vigenere CIPHER

The best explanation: AUTOKEY cipher like vigenere cipher uses vigenere table in order to encrypt the plain text. The difference in these cipher is the USAGE of the keyword.

154.

Which of the following is not a type of poly alphabetic cipher?(a) Autokey cipher(b) Hill cipher(c) One time pad cipher(d) Additive cipherThis question was addressed to me during an interview for a job.Enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (d) Additive cipher

The best explanation: In POLY alphabetic cipher each symbol of plain text is REPLACED by a DIFFERENT cipher text REGARDLESS of its occurrence. Out of the given options only additive cipher is not a poly alphabetic cipher.

155.

Which of the following correctly defines poly alphabetic cipher?(a) a substitution based cipher which uses multiple substitution at different positions(b) a substitution based cipher which uses fixed substitution over entire message(c) a transposition based cipher which uses multiple substitution at different positions(d) a transposition based cipher which uses fixed substitution over entire messageThe question was posed to me in semester exam.Question is taken from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer» RIGHT choice is (a) a SUBSTITUTION based cipher which uses multiple substitution at different positions

Best EXPLANATION: Poly ALPHABETIC cipher is a type of substitution cipher. It uses multiple substitution at different positions in ORDER to cipher the plain text.
156.

Encryption in Autokey cipher is done using ___________(a) vigenere formula(b) vigenere cycle(c) vigenere table(d) vigenere additionThe question was posed to me in exam.I'd like to ask this question from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (C) vigenere table

Easy EXPLANATION - Encryption of plain TEXT in AUTOKEY cipher is done using the same table which is used for encryption in vigenere cipher. It is known as vigenere table.

157.

Autokey cipher is an example of ___________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThis question was addressed to me during an interview.My enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (b) POLY-ALPHABETIC cipher

Easiest EXPLANATION - Autokey cipher is a substitution cipher. It falls under the category of poly alphabetic cipher as it uses multiple substitutions at different positions in order to cipher the plain TEXT.

158.

What is the meaning of cipher in cryptography?(a) an algorithm that performs encryption(b) an algorithm that generates a secret code(c) an algorithm that performs encryption or decryption(d) a secret codeI had been asked this question in homework.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (c) an algorithm that performs encryption or decryption

Explanation: Cipher is an algorithm for PERFORMING encryption or decryption. In cryptography, a set of defined steps are followed to GENERATE ciphers. These are necessary to prevent a DATA breach.

159.

What will be the ciphered text corresponding to “ALGORITHM” if beaufort cipher is used for encryption with key as “KEY”?(a) BNJSWOAPV(b) KTSWNQRXM(c) AMIRVNZOU(d) MBPHJSNIUThe question was asked in unit test.This key question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (b) KTSWNQRXM

The explanation is: For encrypting plain text choose the FIRST letter of plain text (i.e. A) in the first horizontal row. Then find the first letter of key (i.e. K) in the column obtained in the first STEP. Finally, choose the leftmost letter of the row (i.e. K) obtained in the PREVIOUS step. So the CORRESPONDING cipher text is “KTSWNQRXM”.

160.

What will be the ciphered text corresponding to “SANFOUNDRY” if beaufort cipher is used for encryption with key as “KEY”?(a) SBPISZTKZH(b) TCQJTAULAI(c) SELFQEXBHM(d) SPBISZKTZHThis question was addressed to me in an interview for internship.Question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (c) SELFQEXBHM

For explanation: For encrypting plain text choose the first letter of plain text (i.e. S) in the first horizontal row. Then find the first letter of key (i.e. K) in the column OBTAINED in the first STEP. Finally, choose the leftmost letter of the row (i.e. S) obtained in the PREVIOUS step. So the CORRESPONDING cipher text is “SELFQEXBHM”.

161.

Beaufort cipher and variant beaufort cipher are same ciphers.(a) True(b) FalseI had been asked this question by my school principal while I was bunking the class.I would like to ask this question from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct CHOICE is (B) False

Explanation: Beaufort cipher is DIFFERENT from variant beaufort cipher. Variant beaufort cipher is a variant of beaufort cipher.

162.

What will be the plain text corresponding to cipher text “SEDGKG” if beaufort cipher is used with key as “KEY”?(a) PRISON(b) DEATHS(c) SAVEUS(d) ABUSEDThis question was addressed to me in an online interview.I want to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (C) SAVEUS

The explanation is: The process of DECRYPTION and ENCRYPTION are exactly the same in beaufort cipher. So the corresponding plain text WOULD be “SAVEUS”.

163.

The process of decryption is exactly same as that of encryption in beaufort cipher.(a) True(b) FalseThe question was posed to me in an interview for job.Question is taken from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Correct OPTION is (a) True

To explain: Beaufort cipher is an EXAMPLE of reciprocal cipher. So that is why the process of DECRYPTION is exactly same as that of encryption in beaufort cipher.

164.

Beaufort cipher is a variant of ____________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherI got this question by my college director while I was bunking the class.My question is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Correct CHOICE is (b) vigenere cipher

Easiest explanation - Beaufort cipher is a variant of vigenere cipher. The difference is that beaufort cipher uses TABULA recta in a DIFFERENT manner for ENCRYPTION.

165.

Which of the following is a difference between beaufort cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas beaufort cipher is mono alphabetic(c) vigenere cipher uses a key whereas no key is required for using beaufort cipher(d) they use the same table for encryption, but in a different mannerThe question was asked in a national level competition.My doubt is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct OPTION is (d) they USE the same table for ENCRYPTION, but in a DIFFERENT manner

The best I can explain: Beaufort CIPHER is a variation of vigenere cipher. They use the same table i.e. tabula recta for encryption but the table is used in a different manner.

166.

Which of the following is reciprocal cipher?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) beaufort cipherThis question was posed to me in an internship interview.My doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» CORRECT choice is (d) beaufort cipher

Explanation: A reciprocal cipher is a cipher in which if we try to ENCRYPT the cipher text (using the same cipher) then we GETS the plain text as a RESULT. In other words, the process of decryption and encryption is exactly the same.
167.

Encryption in beaufort cipher is done using ____________(a) trithemius table(b) vigenere cycle(c) tabula recta(d) four square tableI had been asked this question during an internship interview.I need to ask this question from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (c) TABULA recta

Explanation: Encryption of plain text in BEAUFORT cipher is DONE by making USE of tabula recta. The same table is ALSO used for encryption in vigenere cipher and running key cipher.

168.

Beaufort cipher is an example of ____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in an interview for job.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right ANSWER is (B) poly-alphabetic cipher

To explain: Beaufort cipher is a SUBSTITUTION cipher. It falls under the category of poly alphabetic cipher as it USES MULTIPLE substitutions at different positions in order to cipher the plain text.

169.

What will be the plain text corresponding to cipher text “SCEFJV” if gronsfeld cipher is used with key “1234”?(a) RABBIT(b) RUSSIA(c) RANGER(d) FRIENDThis question was addressed to me during a job interview.The question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (a) RABBIT

To explain: Encryption in GRONSFELD cipher TAKES place by shifting the letters of the plain text by a number GIVEN by the numeric key. So by APPLYING the REVERSE of this method, we get the deciphered text to be “RABBIT”.

170.

What will be the ciphered text corresponding to “ALGORITHM” if gronsfeld cipher is used for encryption with key “4321”?(a) BNJSSKWLN(b) EOIPVLVIQ(c) BNJSRITHM(d) EOIPRITHMThis question was posed to me in my homework.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct OPTION is (b) EOIPVLVIQ

Explanation: Encryption in GRONSFELD cipher takes place by shifting the letters of the plain TEXT by a number given by the NUMERIC key. So by applying this method, we get the CIPHERED text to be “EOIPVLVIQ”.

171.

What will be the ciphered text corresponding to “SANFOUNDRY” if gronsfeld cipher is used for encryption with key as “1234”?(a) TCQJPWQHSA(b) TCQJTAULAI(c) TCQJOUNDRY(d) UETNQYTLTCThis question was addressed to me by my college professor while I was bunking the class.The origin of the question is Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT CHOICE is (a) TCQJPWQHSA

The best I can explain: Encryption in gronsfeld cipher takes place by shifting the letters of the PLAIN text by a number GIVEN by the numeric KEY. So by applying this method, we get the ciphered text to be “TCQJPWQHSA”.

172.

Which of the following is not a transposition cipher?(a) rail fence cipher(b) gronsfeld cipher(c) hill cipher(d) route cipherI had been asked this question by my college director while I was bunking the class.The question is from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer» CORRECT option is (b) gronsfeld cipher

The BEST I can explain: Rail fence, HILL and route cipher are examples of transposition cipher. Gronsfeld cipher is a SUBSTITUTION cipher and so is the correct option.
173.

Gronsfeld cipher is a substitution cipher.(a) True(b) FalseI have been asked this question in final exam.Question is taken from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer» RIGHT answer is (a) True

To explain: GRONSFELD cipher is a type of substitution cipher. It is a variation of VIGENERE cipher.
174.

What will be the plain text corresponding to cipher text “EETPEG” if gronsfeld cipher is used with key “4321”?(a) ABACUS(b) ABROAD(c) ABRUPT(d) ABUSEDThe question was posed to me in a job interview.I'd like to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (b) ABROAD

Best explanation: Encryption in gronsfeld cipher takes place by shifting the letters of the PLAIN TEXT by a NUMBER GIVEN by the numeric KEY. So by applying the reverse of this method, we get the deciphered text to be “ABROAD”.

175.

Gronsfeld cipher is harder to crack than caesar cipher.(a) True(b) FalseI have been asked this question in a national level competition.I'd like to ask this question from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (a) True

To explain: In gronsfeld CIPHER we shift the LETTERS of the PLAIN text on the BASIS of the key value. So it BECOMES a more complex version of the caesar cipher and thus harder to crack.

176.

Gronsfeld cipher is a variation of ____________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherThis question was posed to me by my school principal while I was bunking the class.This question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

The correct option is (b) vigenere cipher

To explain: GRONSFELD cipher is a variation of vigenere cipher. The DIFFERENCE is that vigenere cipher USES an alphabetical KEY whereas the key of gronsfeld cipher consists of numbers.

177.

Which of the following cipher does not require the use of tabula recta?(a) running key cipher(b) vigenere cipher(c) gronsfeld cipher(d) trithemius cipherThis question was addressed to me during an interview for a job.My enquiry is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Right ANSWER is (c) gronsfeld CIPHER

To explain: Ciphers like RUNNING key cipher, VIGENERE cipher, TRITHEMIUS cipher etc. makes use of tabula recta. Whereas gronsfeld cipher does not require tabula recta for encryption of plain text.

178.

Which of the following cipher uses a numeric key?(a) gronsfeld cipher(b) vigenere cipher(c) trithemius cipher(d) running key cipherI got this question during a job interview.This interesting question is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (a) GRONSFELD cipher

To explain: Gronsfeld cipher is a variation of vigenere cipher. The DIFFERENCE is that vigenere cipher uses an ALPHABETICAL key whereas gronsfeld cipher uses NUMERIC key.

179.

Gronsfeld cipher is similar to?(a) additive cipher(b) multiplicative cipher(c) caesar cipher(d) affine cipherThe question was posed to me in examination.My question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Correct answer is (c) caesar CIPHER

Easy explanation - In gronsfeld cipher we shift the LETTERS of the PLAIN text on the BASIS of the key value. So it becomes a modified version of the caesar cipher.

180.

Which of the following is true about encryption in gronsfeld cipher?(a) It replaces letters with numbers(b) It shifts the letters of plain text on the basis of key value(c) It makes substitutions by using tabula recta(d) It makes substitutions on the basis of a mathematical formulaI have been asked this question in final exam.I would like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (b) It SHIFTS the letters of plain text on the basis of KEY value

The best explanation: Encryption of plain text in gronsfeld CIPHER is DONE by shifting the letters of plain text on the basis of key value. So it is similar to CAESAR cipher.

181.

Gronsfeld cipher is an example of _____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in my homework.The query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (b) POLY-ALPHABETIC cipher

To EXPLAIN: Gronsfeld cipher is a SUBSTITUTION cipher. It falls under the category of poly alphabetic cipher as it uses multiple substitutions at different positions in ORDER to cipher the plain text.

182.

Which of the following is not true about atbash cipher?(a) it is a mono alphabetic substitution cipher(b) it can only be used to encrypt hebrew alphabet(c) it is a special case of affine cipher(d) it is weaker than playfair cipherI had been asked this question in examination.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT option is (b) it can only be used to encrypt hebrew alphabet

The best I can EXPLAIN: Atbash CIPHER was originally built to encrypt hebrew alphabet. But it can be used to encrypt any TYPE of alphabets.

183.

What will be the plain text corresponding to ciphered text “MAO” if atbash cipher is used for encryption?(a) NZL(b) IND(c) AUS(d) ENGThe question was posed to me in quiz.This intriguing question comes from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (a) NZL

Explanation: ATBASH cipher replaces each alphabet of the plain text with a CORRESPONDING letter which we can SEE in the table below.

184.

What will be the ciphered text corresponding to plain text “SECRET” if atbash cipher is used for encryption?(a) VHIXVG(b) HVXIVG(c) HXVIVG(d) VIHXIVI have been asked this question in an international level competition.This intriguing question originated from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Correct choice is (B) HVXIVG

The EXPLANATION is: Atbash cipher REPLACES each alphabet of the plain TEXT with a corresponding letter which we can see in the table below.

185.

Atbash cipher cannot be cracked until the exact type of encryption of ciphered text is known.(a) True(b) FalseThis question was posed to me in examination.My question is based upon Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (b) False

The EXPLANATION is: ATBASH cipher is a very weak cipher. It can be easily BROKEN without even knowing the exact technique which has been used for encryption. We can just ASSUME the ciphered text to be a substitution cipher in order to crack it.

186.

Atbash cipher is an example of?(a) Mono alphabetic substitution cipher(b) Transposition cipher(c) Poly alphabetic substitution cipher(d) Geometric substitution cipherThis question was posed to me in an interview.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer» RIGHT option is (a) Mono alphabetic substitution cipher

Easiest explanation - Atbash cipher is an example of mono alphabetic substitution cipher. It REPLACES each ALPHABET of the plain TEXT with a corresponding letter which we can see in the table below.
187.

Atbash cipher is less secure than affine cipher.(a) True(b) FalseThis question was addressed to me by my college director while I was bunking the class.I'm obligated to ask this question of Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct answer is (a) True

The best I can EXPLAIN: Affine cipher is more secure as compared to pigpen cipher. Atbash cipher is a special CASE of affine cipher and can be CRACKED WITHOUT even knowing which TECHNIQUE has been used for encryption.

188.

Which of the following is a mono alphabetic substitution cipher?(a) vigenere cipher(b) one time pad cipher(c) play fair cipher(d) atbash cipherThis question was posed to me in an international level competition.My question is from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

The correct choice is (d) atbash cipher

Best EXPLANATION: Atbash cipher is the only MONO alphabetic SUBSTITUTION cipher out of the GIVEN options. All the REMAINING options fall under the category of poly alphabetic cipher.

189.

Choose the weakest cipher from the following?(a) vigenere cipher(b) rail fence cipher(c) hill cipher(d) atbash cipherThe question was posed to me during an internship interview.I want to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (d) atbash cipher

For explanation: Atbash cipher is the weakest cipher out of the given OPTIONS. This is because it is a SIMPLE MONO ALPHABETIC substitution cipher with almost no security. It can be cracked WITHOUT even knowing which technique has been used for encryption.

190.

Which of the following cipher is a special case of affine cipher?(a) Vigenere cipher(b) Autokey cipher(c) Atbash cipher(d) Hill cipherI have been asked this question in an international level competition.My question is based upon Cryptography in section Cryptography of Data Structures & Algorithms II

Answer» CORRECT option is (c) Atbash cipher

Easiest explanation - Atbash cipher is a SPECIAL case of affine cipher. We have to ASSUME a=b=25 as the KEY in affine cipher to get the same ENCRYPTION.
191.

Atbash cipher was originally used for encrypting _____________(a) english alphabet(b) greek alphabet(c) hebrew alphabet(d) hindi alphabetThe question was posed to me in an online quiz.The above asked question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (C) hebrew alphabet

Easy explanation - ATBASH CIPHER was originally built to encrypt hebrew alphabet. But it can be used to encrypt any type of alphabets.

192.

Which of the following cipher does not require a key for encrypting plain text?(a) atbash cipher(b) affine cipher(c) playfair cipher(d) vigenere cipherI had been asked this question during an interview.My question is based upon Cryptography topic in chapter Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT answer is (a) atbash cipher

The best I can EXPLAIN: Out of the given options only atbash cipher does not require a KEY for ENCRYPTION. Atbash cipher is an example of a substitution cipher.

193.

What will be the ciphered text if the string “SANFOUNDRY” is given as input to the code of vigenere cipher with keyword as “HELLO”?(a) UEWIIDKLL(b) ZEYQCOCM(c) ZEYQCBROCM(d) ZEYQCBROCMJDHThis question was posed to me in an online quiz.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (c) ZEYQCBROCM

Explanation: VIGENERE CIPHER is a type of POLY ALPHABETIC substitution which uses vigenere table for MAKING substitutions in the plain text. Using the table we find the solution to be ZEYQCBROCM.

194.

In which of the following cipher the plain text and the ciphered text does not have a same number of letters?(a) affine cipher(b) vigenere cipher(c) columnar cipher(d) additive cipherThe question was asked by my school teacher while I was bunking the class.Query is from Cryptography topic in division Cryptography of Data Structures & Algorithms II

Answer»

Right choice is (b) vigenere CIPHER

Explanation: In transposition cipher and mono alphabetic cipher the number of LETTERS remain same in ciphered and deciphered TEXT. But in POLY alphabetic cipher the number of letters are different. So here as vigenere cipher is the only poly alphabetic cipher so it will be the answer.

195.

What will be the plain text corresponding to cipher text “PROTO” if vigenere cipher is used with keyword as “HELLO”?(a) SANFOUNDRY(b) WORLD(c) INDIA(d) AMERICAThe question was asked by my college director while I was bunking the class.My doubt is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

The CORRECT option is (c) INDIA

Best explanation: VIGENERE cipher is a type of POLY alphabetic substitution which uses vigenere table for making substitutions in the plain text. Using the table we find the plain text to be “INDIA”.

196.

Vigenere cipher is harder to decipher than keyword cipher.(a) true(b) falseI had been asked this question in an online interview.This is a very interesting question from Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (a) true

The best I can EXPLAIN: KEYWORD cipher is less secure than vigenere cipher. It is due to the fact that keyword cipher is mono alphabetic and THUS can be cracked using frequency ANALYSIS. But vigenere cipher being a poly alphabetic cipher cannot be deciphered using this method.

197.

Vigenere table consists of _________(a) 26 rows and 26 columns(b) 26 rows and 1 column(c) 1 row and 26 columns(d) 27 rows and 27 columnsThe question was posed to me by my school teacher while I was bunking the class.My question is based upon Cryptography in division Cryptography of Data Structures & Algorithms II

Answer»

Right option is (a) 26 rows and 26 COLUMNS

The best explanation: ENCRYPTION of plain TEXT using vigenre cipher is done by making use of VIGENERE table. It consists of 26 rows and 26 columns which have alphabets written 26 times. These are SHIFTED towards left after each row.

198.

Which of the following is not a type of poly alphabetic cipher?(a) Rotor cipher(b) Hill cipher(c) One time pad cipher(d) Multiplicative cipherThe question was asked during an interview.This is a very interesting question from Cryptography in portion Cryptography of Data Structures & Algorithms II

Answer»

The correct CHOICE is (d) Multiplicative cipher

Easiest EXPLANATION - In POLY alphabetic cipher each symbol of plain text is replaced by a different cipher text REGARDLESS of its occurrence. Out of the given options only multiplicative cipher is not a poly alphabetic cipher.

199.

Which of the following correctly defines poly alphabetic cipher?(a) a substitution based cipher which uses multiple substitution at different positions(b) a substitution based cipher which uses fixed substitution over entire message(c) a transposition based cipher which uses multiple substitution at different positions(d) a transposition based cipher which uses fixed substitution over entire messageI have been asked this question during a job interview.Asked question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II

Answer»

Right answer is (a) a substitution BASED cipher which uses multiple substitution at DIFFERENT positions

The best I can EXPLAIN: Poly alphabetic cipher is a type of substitution cipher. It uses multiple substitution at different positions in order to cipher the plain TEXT.

200.

Encryption in Vigenere cipher is done using _________(a) vigenere formula(b) vigenere cycle(c) vigenere square(d) vigenere additionThe question was asked in homework.The query is from Cryptography in section Cryptography of Data Structures & Algorithms II

Answer»

Correct option is (c) vigenere SQUARE

To explain: Encryption of plain text USING vigenre CIPHER is DONE by making use of vigenere table. It is also known as vigenere square.