An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.
A. man-in-the-middle
B. timing
C. known-plaintext
D. selected-plaintext
Answer: C
Computer Science & Information Technology
You might also like to view...
The default time-to-live (TTL) value is typically one ____.
A. minute B. hour C. day D. week
Computer Science & Information Technology
How do you apply a stroke or drop shadow?
What will be an ideal response?
Computer Science & Information Technology
A ____ error occurs when the computer is instructed to divide by 0.
A. Syntax B. Run-time C. Logic D. Semantic
Computer Science & Information Technology
A(n) data series is a sequence of related numbers that shows a trend. __________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology