1)What algorithm is commonly used in the second stage of triple encryption?
2)Provide the answer for Problem 7.14.a.i on pages 221-222of your text.