Eve has bet Bob that she can figure out the AES secret key he shares with Alice if he will simply encrypt 20 messages for Eve using that key. For some unknown reason, Bob agrees. Eve gives him 20 messages, which he then encrypts and emails back to Eve. What kind of attack is Eve using here?

What will be an ideal response?

This is a chosen-plaintext attack.

Computer Science & Information Technology

You might also like to view...

External hard drives are intended to be portable

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ will display in the upper right corner of a cell if a comment has been inserted in that cell

A) small blue triangle B) green exclamation point C) small red triangle D) orange asterisk

Computer Science & Information Technology