Network Security
 1. ________ is the science and art of transforming messages to make them secure and immune to attacks.       
 2. The ________is the original message before transformation       
 3. The ________ is the message after transformation       
 4. A(n) _______ algorithm transforms plaintext to ciphertext       
 5. A(n) ______ algorithm transforms ciphertext to plaintext       
 6. A combination of an encryption algorithm and a decryption algorithm is called a ________.       
 7. The _______ is a number or a set of numbers on which the cipher operates       
 8. In a(n) ________ cipher, the same key is used by both the sender and receiver.       
 9. In a(n) ________, the key is called the secret key.       
 10. . In a(n) ________ cipher, a pair of keys is used.