Which of the following is an attack technique where the only information available to the attacker is some plaintext blocks along with the corresponding ciphertext and algorithm used to encrypt and decrypt the text?

A. Ciphertext-only attack
B. Adaptive chosen-plaintext attack
C. Chosen-plaintext attack
D. Known-plaintext attack


Answer: D. Known-plaintext attack

Computer Science & Information Technology

You might also like to view...

You can use the ____ statement to handle exceptions that occur while an application is running.

A. Error…Catch B. Try…Catch C. Error…Block D. Try…Block

Computer Science & Information Technology

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

A. Computer-aided design B. Software-aided design C. Application-aided design D. Program-aided design

Computer Science & Information Technology

Computer owners frequently upgrade their computer's processor.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The process of calculating which action will lead to the greatest happiness is sometimes called the ____.

A. utilitarian calculus B. consequentialist matrix C. behavioral trigonometry D. differential calculus

Computer Science & Information Technology