Which one of the following methods of cryptanalysis should you use if you only have access to the cipher text messages (all of which have been encrypted using the same encryption algorithm), and want to perform statistical analysis to attempt to determine the potentially weak keys?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which one of the following methods of cryptanalysis should you use if you only have access to the cipher text messages (all of which have been encrypted using the same encryption algorithm), and want to perform statistical analysis to attempt to determine the potentially weak keys?
A . birthday attack
B . chosen-plaintext attack
C . ciphertext-only attack
D . chosen-ciphertext attack

Answer: C

Leave a Reply

Your email address will not be published.