Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 194 Topic 20 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 194 Topic 20 Discussion

312-50v13 Exam Topic 20 Question 194 Discussion:
Question #: 194
Topic #: 20

An attacker examines differences in ciphertext outputs resulting from small changes in the input to deduce key patterns in a symmetric algorithm. What method is being employed?


A.

Differential cryptanalysis on input-output differences


B.

Timing attack to infer key bits based on processing time


C.

Brute-force attack to try every possible key


D.

Chosen-ciphertext attack to decrypt arbitrary ciphertexts


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.