An attacker is trying to crack an encryption scheme in order to discover secret information. The attacker is able to get his own plaintext messages encrypted by the same mechanism used to protect the secret information he is trying to obtain. This method of attack is known as:

a. Chosen plaintext attack
b. Chosen ciphertext attack
c. Cryptanalysis
d. Man in the middle

a. Chosen plaintext attack

Computer Science & Information Technology

You might also like to view...

In Access, tables, queries, forms, and reports are all known generally as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The statements gr.DrawLine(Pens.Red, 10, 20, 30, 40) and gr.DrawLine(Pens.Red, 30, 40, 10, 20) draw the same line. 2. The statement gr.FillRectangle(Brushes.Red, 10, 20, 30, 40) draws a solid rectangle of width 40 pixels. 3. The statement gr.FillRectangle(Brushes.Red, 0, 0, picOutput.Width/2, picOuput.Height/2) colors the upper-left quarter of the picture box red. 4. The statement gr.FillPie(Brushes.Red, 10, 10, 30, 30, 0, 180) draws a semi- circle. 5. The sector of a circle with sweep angle 90 consists of a quarter of the circle.

Computer Science & Information Technology