The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A. one-way function
B. time complexity
C. chosen ciphertext
D. man-in-the-middle

D. man-in-the-middle

Computer Science & Information Technology

You might also like to view...

What property of a hash function means that collisions are not a security problem. That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

What will be an ideal response?

Computer Science & Information Technology

In general, parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism.

A. resource B. register C. data D. task

Computer Science & Information Technology