Que: Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. a. secret key b. external programs c. add-ons d. secondary key Answer: secret key