Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.
A. public key
B. private key
C. monoalphabetic
D. monolithic
Answer: B
Computer Science & Information Technology
You might also like to view...
Software that is available for use at no cost is known as ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
All formulas used in a Word table begin with:
A) a percent sign (%). B) an ampersand sign (&). C) a dollar sign ($). D) an equal sign (=).
Computer Science & Information Technology