Author Question: All encryption algorithms are based on two general principles: substitution and _________. What ... (Read 56 times)

wrbasek0

  • Hero Member
  • *****
  • Posts: 560
All encryption algorithms are based on two general principles: substitution and _________.
 
  What will be an ideal response?

Question 2

For symmetric encryption to work the two parties to an exchange must share the same _____, which must be protected from access by others.
 
  What will be an ideal response?



Cheesycrackers

  • Sr. Member
  • ****
  • Posts: 333
Answer to Question 1

transposition

Answer to Question 2

key



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Medication errors are three times higher among children and infants than with adults.

Did you know?

Today, nearly 8 out of 10 pregnant women living with HIV (about 1.1 million), receive antiretrovirals.

Did you know?

More than 50% of American adults have oral herpes, which is commonly known as "cold sores" or "fever blisters." The herpes virus can be active on the skin surface without showing any signs or causing any symptoms.

Did you know?

All adverse reactions are commonly charted in red ink in the patient's record and usually are noted on the front of the chart. Failure to follow correct documentation procedures may result in malpractice lawsuits.

Did you know?

Street names for barbiturates include reds, red devils, yellow jackets, blue heavens, Christmas trees, and rainbows. They are commonly referred to as downers.

For a complete list of videos, visit our video library