In which method the key-stream is generated independently of the message?
(a) Synchronous encryption method
(b) Self synchronous encryption method
(c) All of the mentioned
(d) None of the mentioned
This question was addressed to me by my college director while I was bunking the class.
This is a very interesting question from Stream Encryption and Commercial Applications topic in chapter Spread Spectrum Techniques of Digital Communications