Author Question: All encryption algorithms are based on two general principles: substitution and _________. What ... (Read 15 times)

wrbasek0

  • Hero Member
  • *****
  • Posts: 560
All encryption algorithms are based on two general principles: substitution and _________.
 
  What will be an ideal response?

Question 2

For symmetric encryption to work the two parties to an exchange must share the same _____, which must be protected from access by others.
 
  What will be an ideal response?



Cheesycrackers

  • Sr. Member
  • ****
  • Posts: 333
Answer to Question 1

transposition

Answer to Question 2

key



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

Adults are resistant to the bacterium that causes Botulism. These bacteria thrive in honey – therefore, honey should never be given to infants since their immune systems are not yet resistant.

Did you know?

Although not all of the following muscle groups are commonly used, intramuscular injections may be given into the abdominals, biceps, calves, deltoids, gluteals, laterals, pectorals, quadriceps, trapezoids, and triceps.

Did you know?

Blood is approximately twice as thick as water because of the cells and other components found in it.

Did you know?

Coca-Cola originally used coca leaves and caffeine from the African kola nut. It was advertised as a therapeutic agent and "pickerupper." Eventually, its formulation was changed, and the coca leaves were removed because of the effects of regulation on cocaine-related products.

For a complete list of videos, visit our video library