A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
A) brute-force
B) Caesar attack
C) ciphertext only
D) chosen plaintext
A) brute-force
Computer Science & Information Technology
You might also like to view...
Achieving ASCLD accreditation is a rigorous process. A lab must meet about 40 criteria to achieve accreditation.
a. true b. false
Computer Science & Information Technology
The ________ sort usually performs fewer exchanges than the ________ sort.
A) bubble, selection B) selection, bubble C) binary, linear D) linear, binary E) linear, bubble
Computer Science & Information Technology