In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

A. chosen-ciphertext
B. chosen-plaintext
C. known plaintext
D. ciphertext-only

Answer: D

Computer Science & Information Technology

You might also like to view...

RAID is an acronym for a __________ array of independent disk drives that stores information across multiple units to spread out data and minimize the impact of a single drive failure.

A. replicated B. resistant C. random D. redundant

Computer Science & Information Technology

You can make text bold using the ____ property.

A. font-weight B. font-style C. Either A or B. D. Neither A nor B.

Computer Science & Information Technology