A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
A. mode of operation B. hash function
C. cryptanalysis D. brute-force attack
D. brute-force attack
Computer Science & Information Technology
You might also like to view...
Which of the following is not a primary consideration when designing a report?
A) Who will use the report B) How many pages long the report will be C) The purpose of the report D) What information will be needed in the report
Computer Science & Information Technology
_________ are often populated with data from source data automation technologies such as bar code scanners.
A. DSS B. ERP C. FAIS D. TPS
Computer Science & Information Technology