Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 112-51 Topic 7 Question 22 Discussion

Actual exam question for Eccouncil's 112-51 exam
Question #: 22
Topic #: 7
[All 112-51 Questions]

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

Show Suggested Answer Hide Answer
Suggested Answer: C

A transposition cipher is a type of cipher that encrypts a document by rearranging the same characters to produce the ciphertext. A transposition cipher does not change the identity or frequency of the characters, but only their position. A transposition cipher can use various methods to permute the characters, such as writing them in a grid and reading them in a different order, or shifting them along a rail fence pattern. A transposition cipher is a simple and fast algorithm, but it can be easily broken by frequency analysis or anagramming. A transposition cipher is the type of cipher employed by Kevin in the above scenario, as he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext. Reference:

Transposition cipher - Wikipedia

Network Security: Transposition Cipher Techniques - Coding Streets

Network Defense Essentials (NDE) | Coursera - Module 4: Cryptography Techniques

Columnar Transposition Cipher - GeeksforGeeks


Contribute your Thoughts:

Lavonna
1 months ago
Kevin probably thought, 'Hey, if it's good enough for the ancient Egyptians, it's good enough for me!' Transposition cipher all the way.
upvoted 0 times
...
Gregoria
2 months ago
Hmm, I'm not sure. Maybe he was just feeling lazy and wanted to keep it simple. A transposition cipher is like the kiddie pool of cryptography.
upvoted 0 times
...
Dona
2 months ago
Wait, wasn't Kevin supposed to use a more secure algorithm? A transposition cipher is so basic, my grandma could crack that in her sleep.
upvoted 0 times
Merri
10 days ago
D) Block cipher
upvoted 0 times
...
Eugene
12 days ago
C) Transposition cipher
upvoted 0 times
...
Daryl
16 days ago
B) Stream cipher
upvoted 0 times
...
Lou
20 days ago
A) Substitution cipher
upvoted 0 times
...
...
Sommer
2 months ago
Definitely a transposition cipher, Kevin didn't replace any characters, he just rearranged them. Easy peasy!
upvoted 0 times
...
Alesia
2 months ago
Kevin probably thought, 'Hey, if it's good enough for the ancient Egyptians, it's good enough for me!' Transposition cipher all the way.
upvoted 0 times
Craig
1 months ago
C) Transposition cipher
upvoted 0 times
...
Alona
1 months ago
B) Stream cipher
upvoted 0 times
...
Tambra
1 months ago
A) Substitution cipher
upvoted 0 times
...
...
Anika
2 months ago
Hmm, I'm not sure. Maybe he was just feeling lazy and wanted to keep it simple. A transposition cipher is like the kiddie pool of cryptography.
upvoted 0 times
...
Isidra
3 months ago
Wait, wasn't Kevin supposed to use a more secure algorithm? A transposition cipher is so basic, my grandma could crack that in her sleep.
upvoted 0 times
Kimi
1 months ago
A) Substitution cipher
upvoted 0 times
...
Ashley
1 months ago
Transposition cipher is not very secure, Kevin should have used a stronger encryption method.
upvoted 0 times
...
Gearldine
2 months ago
D) Block cipher
upvoted 0 times
...
Mammie
2 months ago
C) Transposition cipher
upvoted 0 times
...
Arlene
2 months ago
B) Stream cipher
upvoted 0 times
...
Dean
2 months ago
A) Substitution cipher
upvoted 0 times
...
...
Zona
3 months ago
I'm not sure, but I think it could also be a Stream cipher since it rearranges characters in a continuous stream.
upvoted 0 times
...
Stephaine
3 months ago
Definitely a transposition cipher, Kevin didn't replace any characters, he just rearranged them. Easy peasy!
upvoted 0 times
Roosevelt
2 months ago
D) Block cipher
upvoted 0 times
...
Alonzo
2 months ago
C) Transposition cipher
upvoted 0 times
...
Ilda
2 months ago
B) Stream cipher
upvoted 0 times
...
Stephaine
3 months ago
A) Substitution cipher
upvoted 0 times
...
...
Ernest
3 months ago
I agree with Jin, because rearranging characters sounds like a Transposition cipher.
upvoted 0 times
...
Jin
3 months ago
I think Kevin used a Transposition cipher.
upvoted 0 times
...

Save Cancel