An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The
attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
A.
Birthday attack
B.
Plaintext attack
C.
Meet in the middle attack
D.
Chosen ciphertext attack