answersLogoWhite

0


Best Answer

This message has been encoded using a 5-stage encryption technique consisting of two codes. To break it, you will need to determine which two codes I have used (one of them is breathtakingly simple) and what order you need to use the various steps of the codes to make the message make sense.

9248 36976 4348437 23878 4448 7427385 38 368 23633 9469.

Your clues are as follows.

1) You cannot work directly backwards from the way I encrypted, or your message will not make sense. The steps that I coded look like this:

1, 2, 3, 4, 5.

To decode, it will look like this:

5, 3, 2, 4, 1.

2) Two codes have been used.

Good Luck!

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Try to break encryption
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Information Science

What are three methods that can be used to ensure confidentiality of information?

Encryption: Encrypting sensitive information using encryption algorithms and keys can prevent unauthorized access. Access controls: Implementing strict access controls, such as authentication and authorization mechanisms, can restrict access to sensitive information to only authorized personnel. Data masking: Applying data masking techniques, such as replacing sensitive data with random characters or symbols, can help protect the confidentiality of information when shared or displayed.


History of information systems security?

Information systems security has evolved over time in response to increasing threats and technological advancements. It started with simple encryption methods and password protections in the early days of computing. As technology advanced, more sophisticated security measures such as firewalls, intrusion detection systems, and encryption algorithms were developed. Today, information systems security is a critical component of any organization's operations, with a focus on protecting against cyber threats, data breaches, and unauthorized access.


The protection of classified information and controlled unclassififed information may inolve applying?

security clearances, access controls, encryption techniques, and strict handling procedures to prevent unauthorized access or disclosure.


Where is the criticsl information list located?

The critical information list is typically located in the site's database or server, where sensitive data like passwords, encryption keys, or personal information is stored. It is crucial to secure this list to prevent unauthorized access and data breaches.


What is The term frequently used to describe the tasks of securing information that is in a digital format?

Cybersecurity refers to the process of protecting computer systems, networks, and data from unauthorized access or attacks. It includes measures such as encryption, access control, and regular security assessments to safeguard digital information.

Related questions

What is encryption that is loosely defined as very difficult to break?

strong encryption


How successful have hackers been at trying to break the DRM encryption?

I don't know! soz


Does encryption apply only to files and not folders?

Encryption can be done on documents and files. There are also major software that support folder encryption. Try using the ones that have tried and tested like Axcrypt and Data Protecto.


What method of attack is used to try to guess passwords or to decipher an encryption code?

pishing


What is Scrambling of messages at the sending end and unscrambling them at the receiveing end is called?

Encryption


When and how encryption software used?

Encryption software are a trustworthy and reliable form of data security tools. It converts your data and files from plain text to cipher text/ encrypted language thus rendering it undecipherable for unauthroized users. Try encryption software like AxCrypt and Data Protecto.


How its is important of encryption?

File encryption is the most prevalent form of data security and it is hihgly essential if you are looking for data security. Try some nice security software like Data Protecto or AxCrypt.


How difficult is it to break the code on email encryption software?

Breaking the code on email encryption is a complicated and difficult process. There are many steps involved, and a lot of knowledge is required. Code breaking may also be considered illegal and punishable by law.


What is military-grade encryption?

Millitary grade encrytion refers the AES-256 bit encryption. Military grade encryption has been generated from the security service for the US government and its military. The encryption system are considered as the unbreakable for the security by the hackers or any third party. Many commercial products utilizes the system. CovermeVPN also is a military grade VPN service. So, try the best security tool that ensures the military grade encryption system.


What is the name of the bone you try not to break during CPR?

The bone that you try not to break is the xiphoid process.


What is the difference between advanced encryption algorithm and encryption algorithm?

People have developed many encryption algorithms. One particular encryption algorithm is the Rijndael algorithm, usually called the AES or Advanced Encryption Standard.


Is encryption crackable?

Encryption is converting plain text into cipher text . Yes, encryption can be cracked and then the text can be decrypted.