answersLogoWhite

0

Two basic functions used in Encryption Algorithms are * Substitution * Transposition

User Avatar

Wiki User

15y ago

Still curious? Ask our experts.

Chat with our AI personalities

LaoLao
The path is yours to walk; I am only here to hold up a mirror.
Chat with Lao
FranFran
I've made my fair share of mistakes, and if I can help you avoid a few, I'd sure like to try.
Chat with Fran
SteveSteve
Knowledge is a journey, you know? We'll get there.
Chat with Steve
More answers

Substitution & Transposition

User Avatar

Wiki User

13y ago
User Avatar

Add your answer:

Earn +20 pts
Q: What are the 2 basic functions used in encryption algorithm?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

What are the encryption algorithms used in ATM?

fot the past 25 years single des algorithm was used. But now triple des is used in atm cards for the encryption and decryption.


How do you draw flowchart for overloaded functions?

You don't. A flowchart is one form of a visualization for an algorithm. Overloaded functions are one of many tools used to implement such an algorithm. The algorithm (and, therefore, the flowchart) isn't concerned with the tool needed for the implementation.


Which encryption algorithm is better and why?

If you're talking about symmetric key encryption (the kind where you just use one key for encryption and decryption), then arguably, the best encryption algorithm you can use is the Rijndael algorithm, better known now as AES (advanced encryption standard). It is the encryption standard used by the U.S. government for classified information. It is fast, requires little memory, and the only potential attacks against it are highly theoretical. Rijndael beat out Twofish and Serpent in the AES standard contest, but those other two algorithms will provide more than enough security as well. In the end, it doesn't really matter, since most successful attacks are made simply by finding out your key through brute force, espionage or extortion, rather than pure data analysis. Humans are almost always the weakest point when it comes to security, and it doesn't matter what algorithm you use if someone can guess your password.


How does virtual function support run time polymorphism?

Virtual functions are used to suport runtime polymorphism.In C++,if we have inheritance and we have overridden functions in the inherited classes,we can declare a base class pointer and make it to point to the objects of derived classes.When we give a keyword virtual to the base class functions,the compiler will no do static binding,so during runtime ,the base class pointer can be used to call the functions of the derived classes.Thus virtual functions support dynamic polymorphism.


What is Plaintext?

Plaintext is easily readable or, to be more accurate, decrypted/unencrypted text. This is opposed to ciphertext, which is encrypted. If you used an encryption algorithm to encode your message of "Hello, there" to "4hgu28fhdjf83291". The plaintext form would be: "Hello, there" The ciphertext form would be: "4hgu28fhdjf83291"