Encryption in running key cipher is done using _______________
(a) running key table
(b) vigenere cycle
(c) tabula recta
(d) any table provided by the person performing the encryption
I have been asked this question in an online quiz.
Question is taken from Cryptography topic in division Cryptography of Data Structures & Algorithms II