Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?
1ecb475
4 months, 2 weeks ago74gjd_37
12 months agoGeddy1ng
1 year, 7 months agoGeddy1ng
1 year, 10 months agoGeddy1ng
1 year, 10 months agoresortwri
1 year, 11 months agoBanzaaai
2 years ago[Removed]
3 years agoaosroyal
2 years, 5 months agocbcretaceous27
1 year, 11 months ago