In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
(a) Rolling Cipher
(b) Shift Cipher
(c) Playfair Cipher
(d) Block Cipher
The question was posed to me in examination.
My query is from Cryptography topic in section Cryptography in Security of Cyber Security