A secret message has been encrypted with a key that is as long as the message itself. The key will be used for only this message. The type of encryption used here is:

a. Running key cipher
b. One-time cipher
c. One-time pad
d. Diffie-Hellman

c. One-time pad

Computer Science & Information Technology

You might also like to view...

________ is a professional, business-oriented social networking site

A) Twitter B) LinkedIn C) Flickr D) Picasa

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) Both stings and characters should be enclosed in double quotes ("x"). 2) When a backslash is found within quotes it’s considered part of an escape sequence. 3) The Unicode character set has the same characters as ASCII. 4) When using the string constructor (char, int), the character is repeated in a string as many times as specified by the integer. 5) Strings are not able to be made from an array of characters.

Computer Science & Information Technology