1. Network Security Classical Encryption Techniques 2. 2 Outline • Introduction • Symmetric Cipher Model • Substitution Techniques • Transposition Techniques •…