Which of the following techniques can be used by an administrator while working with the
symmetric encryption cryptography? Each correct answer represents a complete solution. Choose
all that apply.
A.
Block cipher
B.
Stream cipher
C.
Transposition cipher
D.
Message Authentication Code