Which of the following would be MOST desirable when attacking encrypted data?

Which of the following would be MOST desirable when attacking encrypted data?

Which of the following would be MOST desirable when attacking encrypted data?

A.
Weak key

B.
Sniffed traffic

C.
Block cipher

D.
Algorithm used



Leave a Reply 0

Your email address will not be published. Required fields are marked *