Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

Exam 312-50 topic 5 question 4 discussion

Actual exam question from ECCouncil's 312-50
Question #: 4
Topic #: 5
[All 312-50 Questions]

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

  • A. Birthday attack
  • B. Plaintext attack
  • C. Meet in the middle attack
  • D. Chosen ciphertext attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
salei
1 year, 12 months ago
Selected Answer: D
What is the difference between chosen plaintext and chosen ciphertext attack? In both of cases, adversary has access to paintext-ciphertext pairs. Where lies the difference? The difference is how the plaintext-ciphertext pairs that the attacker has access to are generated. In a chosen plaintext attack, the attacker can even choose some plaintext and is handed the corresponding ciphertext. In other words, the attacker may encrypt arbitrary messages. In a chosen ciphertext attack, the attacker can additionally choose some ciphertext and is handed the corresponding plaintext. In other words, the attacker may encrypt and decrypt arbitrary messages.
upvoted 2 times
a4687eb
4 months, 1 week ago
In chosen cyphertext attack Attacker has many samples of encrypted text acquired from sniffing and is able to decrypt arbitarary sample of text. This is chosen cypher text attack beacuse attacker can choose arbitary encrypted text and decrypt it. Observing output and comparing this to input samples he can deduct the encryption key. Chosen-plaintext attack is an opposite attack to chosen-cypher text attack. in Chosen-cypher text attack attacker chooses samples of plaintext, encrypt it and compares output with inputs to deduct encryption key. Question in exam is a bit stupid. Normally doing sniffing is rather unlikely that attacker can decrypt payload and still be looking for encryption key that is often specyfic to session.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...