Which of the following would be MOST desirable when attacking encrypted data?
A.
Weak key
B.
Sniffed traffic
C.
Block cipher
D.
Algorithm used
Which of the following would be MOST desirable when attacking encrypted data?
Which of the following would be MOST desirable when attacking encrypted data?
A.
Weak key
B.
Sniffed traffic
C.
Block cipher
D.
Algorithm used