Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?
1ecb475
5 months, 3 weeks ago74gjd_37
1 year, 1 month agoGeddy1ng
1 year, 8 months agoGeddy1ng
1 year, 11 months agoGeddy1ng
1 year, 11 months agoresortwri
1 year, 12 months agoBanzaaai
2 years, 2 months ago[Removed]
3 years, 1 month agoaosroyal
2 years, 7 months agocbcretaceous27
2 years ago