Which of the following cryptography attacks is similar to the chosen plaintext attack, except that the attacker can obtain ciphertexts encrypted under two different keys?

A. Ciphertext-only attack
B. Known-plaintext attack
C. Chosen-key attack
D. Related-key attack

Answer: D. Related-key attack

Computer Science & Information Technology

You might also like to view...

Which one of the following is an advantage of the PCI-X bus?

A) It is portable and works on Apple and PC-compatible computers. B) It releases the microprocessor from all processing work. C) It is backward compatible with and faster than earlier PCI buses. D) It transmits data more accurately than earlier architectures.

Computer Science & Information Technology

Twitter automatically converts long URLs found in messages submitted via the Twitter Web site into ____________________ URLs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology