An attacker captures the encrypted communication between two parties for a week, but is unable to decrypt the messages. The attacker then compromises the session key during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications, but is unable to.This is because the encryption scheme in use adheres to:
A. Asymmetric encryption
B. Out-of-band key exchange
C. Perfect forward secrecy
D. Secure key escrow
Answer: C. Perfect forward secrecy
Computer Science & Information Technology
You might also like to view...
Datasheets are used to view all records in a table at one time
Indicate whether the statement is true or false
Computer Science & Information Technology
Any formatting or effects that are adjusted while multiple shapes of a SmartArt graphic are selected are applied to all the selected shapes
Indicate whether the statement is true or false
Computer Science & Information Technology