A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

A. mode of operation B. hash function

C. cryptanalysis D. brute-force attack

D. brute-force attack

Computer Science & Information Technology

You might also like to view...

Which of the following is not a primary consideration when designing a report?

A) Who will use the report B) How many pages long the report will be C) The purpose of the report D) What information will be needed in the report

Computer Science & Information Technology

_________ are often populated with data from source data automation technologies such as bar code scanners.

A. DSS B. ERP C. FAIS D. TPS

Computer Science & Information Technology