Problem
1. Distinguish between a modulo and a traditional symmetric-key cipher.
2. Explain why modem block ciphers are designed as substitution ciphers instead of transposition ciphers.
3. Explain why both substitution and transposition ciphers can be thought of as permutations.