Complete the sentences about symmetric encryption.
Use the terms from the list.
Some of the terms in the list will not be used. You should only use a term once.
algorithm cipher copied delete key plain
private public standard stolen understood unreadable
The data before encryption is known as .................................................. text.
To scramble the data, an encryption .................................................., which is a type of .................................................., is used.
The data after encryption is known as .................................................. text.
Encryption prevents the data from being .................................................. by a hacker.
[5]
Did this page help you?