question archive Question 4 : How following Classical Ciphers can be attacked ? Transpositional Cipher ? Vigenere Cipher Question 5: Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access
Subject:Computer SciencePrice: Bought3
Question 4 : How following Classical Ciphers can be attacked
? Transpositional Cipher
? Vigenere Cipher
Question 5: Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.
Question 6: A Cipher "ABCDEFGHIJKLMNO" is captured over the INTERNET, It is encrypted using Columnar Transpositional cipher having key = never. Calculate the Plaintext against the given Cipher.