Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to

be encrypted is SPY and the random digits are 352. Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of

A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.

Answer: C

Business

You might also like to view...

When a company assigns the costs of direct materials, direct labor, and both variable and fixed manufacturing overhead to products, that company is using

a. operations costing. b. absorption costing. c. variable costing. d. product costing.

Business

If a project's expected return is 15%, which represents a 35% return in a booming economy and a 5% return in a stagnant economy, what is the probability of a booming economy?

A) 18.33% B) 25.00% C) 33.33% D) 50.00%

Business