1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
3 years ago
11

The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the

alphabet is randomly replaced with a different letter or character i.e. A→T, B→F… What makes a random substitution cipher more secure than a Caesar shift?
Computers and Technology
1 answer:
timofeeve [1]3 years ago
5 0

Answer: Compared to a Caesar shift, the random substitution cipher offers many more possibilities, because the encryption is randomly chosen.

Explanation:

A Caesar Cipher is also a type of substitution cipher, but instead of doing it randomly, it shifts the alphabet by a certain number of characters. Therefore, the answer to decrypt the message is simply to figure out that number.

You might be interested in
If i hit the delete key three times what will be left
pogonyaev

Answer:

planation:

I got this

6 0
2 years ago
Difference between customized and packaged software​
docker41 [41]

Packaged software is a compilation of programs which are grouped together in order to provide publicly with different tools in the same group.

Custom software is a specific program that are advanced for a goal in a department or in a company.

5 0
2 years ago
Which activity represents a violation of the licensing agreement?
Lena [83]
A) <span>unauthorized duplication of software </span>
6 0
3 years ago
Read 2 more answers
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
Other questions:
  • An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
    12·1 answer
  • Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
    13·2 answers
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • . public members are accessible from ________________ where the object is visible
    9·1 answer
  • What happens if the addressed device does not respond due to a malfunction during a read operation?
    11·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • What is the best example of personally identifiable information.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!