Multiple Choice
The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
A) one-way function
B) time complexity
C) chosen ciphertext
D) man-in-the-middle
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: A considerably larger key size can be
Q22: The Diffie-Hellman key exchange is a simple
Q24: The addition operation in elliptic curve cryptography
Q25: The principal attraction of _,compared to RSA,is
Q26: The _ key exchange involves multiplying pairs
Q28: The security of ElGamal is based on
Q31: Eqa,b)is an elliptic curve with parameters a,b,and
Q32: The Diffie-Hellman algorithm depends on the difficulty
Q40: Included in the definition of an elliptic
Q45: Most of the products and standards that