Posted by: Pdfprep
Post Date: November 7, 2020
One cryptanalysis method that is used to defeat a multi-step encryption process uses both the original clear text to work forward toward an intermediate value, and the ending cipher text to work backward toward an intermediate value so that the key space that is to be defeated is smaller and more computationally manageable.
Which one of the following terms describes this method?
A . brute-force attack
B . meet-in-the-middle attack
C . ciphertext-only attack
D . birthday attack
Answer: B
Leave a Reply