In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?
A. chosen-ciphertext
B. chosen-plaintext
C. known plaintext
D. ciphertext-only
Answer: D
Computer Science & Information Technology
You might also like to view...
A semicolon with nothing preceding it is also a valid statement, called the ____ statement.
a. empty b. null c. blank d. void
Computer Science & Information Technology
A single point is about 1/12 of an inch in height.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What Windows log stores events collected from other systems, to which the system has a subscription?
A. System B. Remotes C. Forwarded Events D. Servers
Computer Science & Information Technology
When text is too long to fit into a cell, Excel will automatically wrap the text
a. true b. false
Computer Science & Information Technology