Multiple Choice
Chosen cipher text attack is based on
A) cryptanalysis
B) cryptography
C) encryption
D) decryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: The sub key length at each round
Q16: Which one of the following is not
Q17: Interception is an attack on<br>A)availability<br>B)confidentiality<br>C)integrity<br>D)authenticity
Q18: Like DES, AES also uses Feistel Structure.<br>A)true<br>B)false<br>C)cannot
Q19: Biometric authentication works on the basis of<br>A)human
Q20: GCD(a,b) = GCD(b,a mod b)<br>A)true<br>B)false<br>C)cannot be determined<br>D)none
Q21: A Ring satisfies the properties<br>A)r-i to r-v<br>B)g-i
Q22: An Abelian Group satisfies the properties<br>A)g-i to
Q24: An 'Integral Domain' satisfies the properties<br>A)g-i to
Q25: AES uses a _bit block size and