PdfPrep.com

Which one of the following methods of cryptanalysis should you use if you only have access to the cipher text messages (all of which have been encrypted using the same encryption algorithm), and want to perform statistical analysis to attempt to determine the potentially weak keys?

Which one of the following methods of cryptanalysis should you use if you only have access to the cipher text messages (all of which have been encrypted using the same encryption algorithm), and want to perform statistical analysis to attempt to determine the potentially weak keys?
A . birthday attack
B . chosen-plaintext attack
C . ciphertext-only attack
D . chosen-ciphertext attack

Answer: C

Exit mobile version