Q 22

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.
A)Digital standards
B)Mathematical attacks
C)Ciphers
D)Timing attacks

Q 23

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.
A)mathematical
B)timing
C)chosen ciphertext
D)brute-force

Q 24

A __________ type of attack exploits properties of the RSA algorithm.
A)timing
B)brute-force
C)chosen ciphertext
D)mathematical