If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________

A. use longer keys B. use shorter keys
C. use more keys D. use less keys

A

Business

You might also like to view...

________ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones

A) 3DES B) AES C) Both A and B D) Neither A nor B

Business

Both programs and procedures are instructions

Indicate whether the statement is true or false

Business