An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can
now use which cryptanalytic technique to attempt to discover the encryption key?
A.
Birthday attack
B.
Plaintext attack
C.
Meet in the middle attack
D.
Chosen ciphertext attack