This attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm.
Which of the following best describes obtaining plain text from cipher text without a key?
This attack occurs when the attacker can intercept session keys and reuse them at a later date.
Which of the following is a disadvantage of symmetric encryption?
Which of the following is not an example of a symmetric algorithm?
Which of the following forms of DES is considered the most vulnerable to attack?
DES uses which of the following for a key size?
What implementation of Triple-DES uses the same key for the first and third iterations?
Which of the following algorithms is used for key distribution, not encryption or digital signatures?
What hashing algorithm produces a 160-bit output?