A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. The general name for this approach is ___________ .

A) rail fence cipher
B) cryptanalysis
C) polyalphabetic substitution cipher
D) polyanalysis cipher


C) polyalphabetic substitution cipher

Computer Science & Information Technology

You might also like to view...

The data hierarchy, arranged from smallest to largest, is:

a. Bit, byte, record, field, file. b. Byte, bit, field, record, file. c. Bit, byte, field, record, file. d. Byte, bit, field, file, record.

Computer Science & Information Technology

The term graphic includes all of the following EXCEPT:

A) photographs. B) line art. C) cartoon drawings. D) tables and borders.

Computer Science & Information Technology

A _____ includes a review of a project’s scope, stakeholders, budget, schedule, and any other internal or external factors that might affect the project.

A. change management plan B. configuration management plan C. debt management plan D. risk management plan

Computer Science & Information Technology

The files created using the ____________ class are readable by the computer but, unlike the files created by the StreamWriter class, you cannot simply open and read the contents of the file using Notepad. A program is needed to interpret the file contents.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology