Multiple Choice
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A) mathematical
B) timing
C) chosen ciphertext
D) brute-force
Correct Answer:

Verified
Correct Answer:
Verified
Q27: The Diffie-Hellman algorithm depends for its effectiveness
Q28: The National Institute of Standards and Technology
Q29: A _ attack involves trying all possible
Q30: Perhaps the most widely used public-key algorithms
Q31: One of the first public-key schemes, _,
Q33: SHA-1 is considered to be very secure.
Q34: If speed is a concern, it is
Q35: The principal attraction of _ compared to
Q36: Timing attacks are only applicable to RSA.
Q37: The purpose of the _ algorithm is