The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
A. one-way function
B. time complexity
C. chosen ciphertext
D. man-in-the-middle
D. man-in-the-middle
Computer Science & Information Technology
You might also like to view...
What property of a hash function means that collisions are not a security problem. That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?
What will be an ideal response?
Computer Science & Information Technology
In general, parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism.
A. resource B. register C. data D. task
Computer Science & Information Technology