Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an application for securely sharing the file. The application employs an encryption algorithm that usesthe same shared secret key for encryption and decryption of data.
Identify the type of cryptography employed by the application used by Alice and Jamie for file sharing.
Submit