Network Security
1. ________ is the science and art of transforming messages to make them secure and immune to attacks.
2. The ________is the original message before transformation
3. The ________ is the message after transformation
4. A(n) _______ algorithm transforms plaintext to ciphertext
5. A(n) ______ algorithm transforms ciphertext to plaintext
6. A combination of an encryption algorithm and a decryption algorithm is called a ________.
7. The _______ is a number or a set of numbers on which the cipher operates
8. In a(n) ________ cipher, the same key is used by both the sender and receiver.
9. In a(n) ________, the key is called the secret key.
10. . In a(n) ________ cipher, a pair of keys is used.