EC
certified ethical hacker
322 Questions
Question No. 1
In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
Choose the correct option from the given list.
01 / 322