Alice and Bob need to exchange some private data online. To do this, Alice creates an algorithm that will encrypt and decrypt data. They secretly meet to share the algorithm, then they each use the algorithm to encrypt their messages and decrypt each other's messages.
What kind of encryption process is this?
A Symmetric encryption.
B. Public key encryption.
C. Vingenere cipher.
D. Firewall software.