11
Hash values Private keys Public keys : Cryptographic algorithm
Private keys
Chosen plain text Known plain text Brute force Chosen ciphertext
Known plain text
Rubber hose attack Brute force attack Trickery attack
Rubber hose attack
Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?
Symmetric
plain text ciphertext steganography encryption algorithm
ciphertext
They are platform-independent. They can be performed in a distributed parallel processing environment. They are fast. They test every possible valid combination.
They test every possible valid combination.
Does not work well for bulk encryption of less sensitive data. Uses only one key to encrypt and decrypt data. Uses only one algorithm type. Does not require the exchange of the shared secret key.
Uses only one key to encrypt and decrypt data.