Which of the attacks below is likely to be used to crac…

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below
is likely to be used to crack the target file?

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below
is likely to be used to crack the target file?

A.
Timing attack

B.
Replay attack

C.
Memory trade-off attack

D.
Chosen plain-text attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *