PdfPrep.com

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
A . Chosen-plaintext attack
B . Ciphertext-only attack
C . Adaptive chosen-plaintext attack
D . Known-plaintext attack

Answer: A

Exit mobile version