A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

A) brute-force
B) Caesar attack
C) ciphertext only
D) chosen plaintext

A) brute-force

Computer Science & Information Technology

You might also like to view...

Achieving ASCLD accreditation is a rigorous process. A lab must meet about 40 criteria to achieve accreditation.

a. true b. false

Computer Science & Information Technology

The ________ sort usually performs fewer exchanges than the ________ sort.

A) bubble, selection B) selection, bubble C) binary, linear D) linear, binary E) linear, bubble

Computer Science & Information Technology