In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.
A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only
Correct Answer:
Verified
Q19: Asymmetric algorithms are more scalable than symmetric
Q20: The _ algorithm does not provide encryption
Q21: The program _ is one of the
Q22: In 1991, NIST established a standard called
Q23: In a _ attack, the attacker has
Q25: MATCHING
Match each term with the correct statement
Q26: Another name for asymmetric algorithms is _
Q27: Cryptography is the process of converting plaintext,
Q28: _ is the original password-cracking program now
Q29: _ attacks are used to find the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents