One of the most widely known cryptographic algorithms is the ____________________, which was developed by IBM and is based on the company's Lucifer algorithm.

Fill in the blank(s) with the appropriate word(s).

Data Encryption Standard

Computer Science & Information Technology

You might also like to view...

Conditional formatting is a way to apply formatting to specific controls based on a comparison to a rule set in the ________ dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

The group of users, sites, networks, or organizations served by the CSIRT is a(n) _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology