All encryption algorithms are based on two general principles: substitution and _________.

Fill in the blank(s) with the appropriate word(s).

transposition

Computer Science & Information Technology

You might also like to view...

The gap in ease of access to technology is known as the ________ divide

A) web B) technology C) Internet D) digital

Computer Science & Information Technology

Which is not a good location for backing up your data on a regular basis?

A) Thumb drive B) External drive C) Network attached storage drive D) Cloud

Computer Science & Information Technology