Encryption in hill cipher is done using ______________
(a) matrix multiplication
(b) a 5×5 table
(c) vigenere table
(d) matrix inversion
This question was posed to me in an interview for internship.
Question is taken from Cryptography topic in section Cryptography of Data Structures & Algorithms II