For which kind of attack does an attacker use known information in encrypted files to break the encryption scheme for the rest of ciphertext?
A . Known-plaintext
B . Known-ciphertext
C . Unknown key
D . Man in the middle
Answer: A
For which kind of attack does an attacker use known information in encrypted files to break the encryption scheme for the rest of ciphertext?
A . Known-plaintext
B . Known-ciphertext
C . Unknown key
D . Man in the middle
Answer: A