_________ Attacks Have Several Approaches,all Equivalent in Effort to Factoring
_________ attacks have several approaches,all equivalent in effort to factoring the product of two primes.
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.
A __________ type of attack exploits properties of the RSA algorithm.