Question 41
A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
Question 42
Storing private keys with a third party is referred to as what?
Question 43
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Question 44
Which of the following is a substitution cipher used by ancient Hebrew scholars?
Question 45
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
