Which are called as substitution encryption techniques?
(a) Caesar cipher
(b) Trithemius cipher
(c) Caesar & Trithemius cipher
(d) None of the mentioned
I had been asked this question in examination.
The above asked question is from Stream Encryption and Commercial Applications in chapter Spread Spectrum Techniques of Digital Communications