Que: Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

a. secret key
b. external programs
c. add-ons
d. secondary key
Answer: secret key

Leave a Comment