Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.

A. public key
B. private key
C. monoalphabetic
D. monolithic

Answer: B

Computer Science & Information Technology

You might also like to view...

Software that is available for use at no cost is known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

All formulas used in a Word table begin with:

A) a percent sign (%). B) an ampersand sign (&). C) a dollar sign ($). D) an equal sign (=).

Computer Science & Information Technology