0% found this document useful (0 votes)
49 views5 pages

15.substitution Techniques

The document provides an overview of substitution techniques in cryptography, focusing on various types of ciphers such as monoalphabetic and polyalphabetic ciphers, including the Caesar and Vigenère ciphers. It discusses their encryption methods, weaknesses, and the significance of keys in these ciphers. Additionally, it highlights the importance of frequency analysis in breaking substitution ciphers and introduces concepts like the one-time pad.

Uploaded by

sarathivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views5 pages

15.substitution Techniques

The document provides an overview of substitution techniques in cryptography, focusing on various types of ciphers such as monoalphabetic and polyalphabetic ciphers, including the Caesar and Vigenère ciphers. It discusses their encryption methods, weaknesses, and the significance of keys in these ciphers. Additionally, it highlights the importance of frequency analysis in breaking substitution ciphers and introduces concepts like the one-time pad.

Uploaded by

sarathivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CYBER SECURITY

PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315


Substitution Techniques

Substitution Techniques

1. What is a substitution cipher?


a) A cipher that shifts each letter of the plaintext by a certain number of positions
b) A cipher that replaces each letter of the plaintext with another letter
c) A cipher that transposes the letters of the plaintext
d) A cipher that encrypts data using multiple keys
Answer: b
Explanation: A substitution cipher replaces each letter in the plaintext with another letter or symbol.
2. Which of the following is a classic example of a substitution cipher?
a) Vigenère cipher
b) Caesar cipher
c) RSA
d) DES
Answer: b
Explanation: The Caesar cipher is a well-known example of a substitution cipher, where each letter
is replaced by another letter a fixed number of positions down or up the alphabet.
3. In a monoalphabetic substitution cipher, how is the plaintext encrypted?
a) By shifting the positions of letters
b) By substituting each letter of the plaintext with a fixed letter from the alphabet
c) By reversing the order of letters in the plaintext
d) By rearranging the letters randomly
Answer: b
Explanation: In a monoalphabetic substitution cipher, each letter in the plaintext is replaced with
another fixed letter from the alphabet.
4. What is the main weakness of a monoalphabetic substitution cipher?
a) It is slow to encrypt and decrypt
b) It uses large keys
c) It can be easily broken using frequency analysis
d) It is only usable for numbers
Answer: c
Explanation: The main weakness of monoalphabetic substitution is that it can be broken through
frequency analysis, as the frequency distribution of letters in the ciphertext often matches that of the
plaintext.
5. What is the key feature of a polyalphabetic substitution cipher?
a) It substitutes each letter of the plaintext with a fixed letter from the alphabet
b) It uses multiple substitution alphabets to encrypt the message
c) It shifts each letter by a fixed number of positions
d) It transposes the letters of the plaintext
Answer: b
Explanation: A polyalphabetic substitution cipher uses multiple substitution alphabets to encrypt the
plaintext, making it harder to break than monoalphabetic substitution.
6. Which cipher is an example of a polyalphabetic substitution cipher?
a) Caesar cipher
b) Vigenère cipher
c) Playfair cipher
d) Enigma machine
Answer: b
Explanation: The Vigenère cipher is a polyalphabetic substitution cipher, where each letter is
substituted using a different alphabet based on a key word.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
7. What is the primary purpose of the key in a substitution cipher?
a) To shift the letters of the ciphertext
b) To determine the encryption and decryption algorithm
c) To replace letters with fixed substitutions
d) To make the cipher unbreakable
Answer: c
Explanation: The key in a substitution cipher determines how letters are replaced in the ciphertext,
ensuring that both encryption and decryption processes are consistent.
8. What is a transposition cipher?
a) A cipher that replaces letters with other letters
b) A cipher that rearranges the order of letters in the plaintext
c) A cipher that shifts the positions of letters in the alphabet
d) A cipher that uses a public and private key pair
Answer: b
Explanation: A transposition cipher rearranges the order of letters in the plaintext to create
ciphertext, unlike substitution ciphers, which replace letters.
9. What is the difference between a monoalphabetic and a polyalphabetic substitution cipher?
a) Monoalphabetic uses one substitution alphabet, while polyalphabetic uses multiple substitution
alphabets
b) Monoalphabetic is more secure than polyalphabetic
c) Polyalphabetic uses shifting letters, while monoalphabetic does not
d) There is no difference
Answer: a
Explanation: In a monoalphabetic cipher, one substitution alphabet is used throughout the message,
while in a polyalphabetic cipher, multiple substitution alphabets are employed.
10. Which cipher improves upon the weaknesses of the Caesar cipher?
a) Vigenère cipher b) Enigma machine c) DES d) RSA
Answer: a
Explanation: The Vigenère cipher improves upon the Caesar cipher by using multiple shifting
alphabets, making it harder to crack using frequency analysis.
11. In a Vigenère cipher, how are the letters of the plaintext encrypted?
a) By shifting each letter by a fixed number of positions
b) By replacing each letter with the corresponding letter in a key
c) By rearranging the letters randomly
d) By using a public key to encrypt the message
Answer: b
Explanation: In the Vigenère cipher, each letter of the plaintext is replaced by the corresponding
letter in the key, which is repeated as necessary.
12. What is the main advantage of the Vigenère cipher over the Caesar cipher?
a) It is faster
b) It is more secure because it uses multiple substitution alphabets
c) It is easier to use
d) It requires fewer keys
Answer: b
Explanation: The Vigenère cipher is more secure because it uses multiple substitution alphabets,
making it harder to break than the Caesar cipher.
13. What is a one-time pad in cryptography?
a) A cipher that uses a key that is used multiple times
b) A cipher that uses a random key that is as long as the message
c) A type of substitution cipher
d) A cipher that never uses a key
Answer: b
Explanation: A one-time pad uses a random key that is as long as the message and is never reused,
ensuring perfect secrecy when used correctly.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
14. What is the primary weakness of the Vigenère cipher?
a) It is susceptible to brute-force attacks
b) It is vulnerable to frequency analysis when the key is short or repeated
c) It is not widely used
d) It requires very large keys
Answer: b
Explanation: If the key in the Vigenère cipher is short or repeated, the cipher becomes vulnerable to
frequency analysis.
15. In which type of substitution cipher are letters replaced by another letter or symbol in a fixed
manner?
a) Polyalphabetic cipher
b) Transposition cipher
c) Monoalphabetic cipher
d) Rail fence cipher
Answer: c
Explanation: In a monoalphabetic cipher, each letter is replaced by another letter or symbol in a
fixed and consistent manner.
16. What is a Caesar cipher?
a) A cipher that shifts the alphabet by a fixed number of positions
b) A cipher that transposes letters in the plaintext
c) A cipher that uses a random key
d) A cipher that uses public-key encryption
Answer: a
Explanation: A Caesar cipher is a substitution cipher that shifts the alphabet by a fixed number of
positions, typically 3 positions.
17. How does frequency analysis help in breaking substitution ciphers?
a) By determining the key size
b) By finding patterns in the ciphertext based on letter frequencies in the language
c) By encrypting the message
d) By decrypting messages with the key
Answer: b
Explanation: Frequency analysis helps break substitution ciphers by analyzing the frequency of
letters in the ciphertext and comparing it to typical letter frequencies in the language of the plaintext.
18. What is the Playfair cipher?
a) A cipher that uses a 5x5 matrix of letters b) A cipher that uses multiple substitution alphabets
c) A cipher that shifts each letter in the alphabet d) A cipher that transposes letters
Answer: a
Explanation: The Playfair cipher is a digraph substitution cipher that uses a 5x5 matrix of letters to
encrypt pairs of letters.
19. Which of the following is a common weakness of substitution ciphers?
a) They are difficult to break b) They can often be cracked using known plaintext attacks
c) They do not require keys d) They are never used in modern cryptography
Answer: b
Explanation: Substitution ciphers can be cracked using known plaintext attacks, where the attacker
guesses part of the plaintext and uses it to find the key.
20. What is the purpose of using a key in substitution ciphers?
a) To randomly select letters for encryption
b) To ensure that the ciphertext is different from the plaintext
c) To perform arithmetic operations on the letters
d) To create a substitution pattern for encryption and decryption
Answer: d
Explanation: The key in substitution ciphers creates a pattern that is used to replace the letters in the
plaintext with those in the ciphertext.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
21. What is the primary advantage of the one-time pad over other substitution techniques?
a) It is computationally efficient
b) It is theoretically unbreakable if used correctly
c) It requires no key exchange
d) It is easier to implement
Answer: b
Explanation: The one-time pad is theoretically unbreakable if the key is truly random, as long as it
is as long as the message and is used only once.
22. Which of the following is NOT a method to break substitution ciphers?
a) Frequency analysis
b) Brute force
c) Ciphertext-only attack
d) Key recovery
Answer: d
Explanation: Key recovery is not a method to break substitution ciphers. Instead, techniques like
frequency analysis and brute force are commonly used.
23. What makes the one-time pad unbreakable?
a) It uses a small key
b) The key is as long as the message and is never reused
c) It encrypts only one letter at a time
d) It uses a public-key system
Answer: b
Explanation: The one-time pad is unbreakable because it uses a random key that is as long as the
message and is never reused.
24. Which cipher is considered secure due to the use of multiple keys for each letter?
a) Caesar cipher
b) Playfair cipher
c) Vigenère cipher
d) Hill cipher
Answer: c
Explanation: The Vigenère cipher is considered secure because it uses multiple keys for each letter
in the plaintext.
25. What is the significance of the key in a one-time pad?
a) It is reused for each message
b) It must be the same length as the message and never reused
c) It must be kept secret but can be shorter than the message
d) It is always a fixed value
Answer: b
Explanation: The key in a one-time pad must be as long as the message and used only once to
ensure perfect secrecy.
26. Which cipher uses a grid of 5x5 to encrypt digraphs?
a) Vigenère cipher
b) Playfair cipher
c) Caesar cipher
d) Substitution cipher
Answer: b
Explanation: The Playfair cipher uses a 5x5 grid of letters to encrypt digraphs (pairs of letters).

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315

27. What is the main disadvantage of using a monoalphabetic substitution cipher?


a) It is difficult to implement
b) It can be easily broken with frequency analysis
c) It requires a very large key
d) It is slow to encrypt and decrypt
Answer: b
Explanation: The main disadvantage of a monoalphabetic substitution cipher is that it can be easily
broken using frequency analysis.
28. In a substitution cipher, which of the following can be used to increase security?
a) Using multiple alphabet shifts or a polyalphabetic cipher
b) Using the same key repeatedly
c) Reducing the length of the key
d) Using smaller blocks of ciphertext
Answer: a
Explanation: Using multiple alphabet shifts or switching to a polyalphabetic cipher increases
security because it makes frequency analysis more difficult.
29. What is the encryption process in a substitution cipher?
a) Rearranging the positions of letters
b) Replacing letters with other letters or symbols
c) Using a public key for encryption
d) Using mathematical functions to transform plaintext
Answer: b
Explanation: In a substitution cipher, the encryption process involves replacing letters with other
letters or symbols according to a set pattern or key.
30. What would be the result of using a short key in a Vigenère cipher?
a) Increased security
b) Decreased security, vulnerable to frequency analysis
c) Faster encryption
d) Easier to implement
Answer: b
Explanation: Using a short key in the Vigenère cipher reduces its security because the key starts
repeating, making it vulnerable to frequency analysis.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315

You might also like