Question 41

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
  • Question 42

    Storing private keys with a third party is referred to as what?
  • Question 43

    In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
  • Question 44

    Which of the following is a substitution cipher used by ancient Hebrew scholars?
  • Question 45

    In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).