Basic functions used in encryption algorithms

2 What are the two basic functions used in encryption algorithms?3 How many keys are required for two people to communicate via a symmetric cipher?4 What is the difference between a block cipher and a stream cipher?5 What are the two general approaches to attacking a...