The ___________ takes the ciphertext and the secret key and produces the original plaintext. It is essentially the encryption algorithm run in reverse.

A) Voronoi algorithm
B) decryption algorithm
C) cryptanalysis
D) diagram algorithm


B) decryption algorithm

Computer Science & Information Technology

You might also like to view...

Data that is taken from the keyboard during program execution is called _______ data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ enable you to define the parts of an image that are important to display

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is spyware that records your typing and then sends your data to someone else

Fill in the blank(s) with correct word

Computer Science & Information Technology

Each application running within Windows 7 is allowed its own memory address space

Indicate whether the statement is true or false

Computer Science & Information Technology