_______________ takes the plain text and the key as input for creating cipher-text.
(a) Decryption Algorithm
(b) Hashing Algorithm
(c) Tuning Algorithm
(d) Encryption Algorithm
This question was addressed to me in quiz.
Question is from Types of Cryptography topic in section Cryptography in Security of Cyber Security