The exact substitutions and transformations performed by the algorithm depend on the ________
A. ciphertext B. decryption algorithm
C. secret key D. encryption algorithm
C
Business
A. ciphertext B. decryption algorithm
C. secret key D. encryption algorithm
C