manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the
data due to its sensitivity. The financial institution is not concerned about computational overheads and slow
speeds. Which of the following cryptographic techniques would BEST meet the requirement?
A. Asymmetric
B. Symmetric
C. Homomorphic
D. Ephemeral