Which of the following cryptography attacks is similar to the chosen plaintext attack, except that the attacker can obtain ciphertexts encrypted under two different keys?
A. Ciphertext-only attack
B. Known-plaintext attack
C. Chosen-key attack
D. Related-key attack
Answer: D. Related-key attack
Computer Science & Information Technology
You might also like to view...
Which one of the following is an advantage of the PCI-X bus?
A) It is portable and works on Apple and PC-compatible computers. B) It releases the microprocessor from all processing work. C) It is backward compatible with and faster than earlier PCI buses. D) It transmits data more accurately than earlier architectures.
Computer Science & Information Technology
Twitter automatically converts long URLs found in messages submitted via the Twitter Web site into ____________________ URLs.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology