If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________
A. use longer keys B. use shorter keys
C. use more keys D. use less keys
A
Business
A. use longer keys B. use shorter keys
C. use more keys D. use less keys
A