✅ Перевірена відповідь на це питання доступна нижче. Наші рішення, перевірені спільнотою, допомагають краще зрозуміти матеріал.
Bob connects to a public Wi-Fi at a coffee shop and uses a website that claims to support end-to-end encrypted messaging using Diffie-Hellman key exchange. However, an attacker sitting nearby is able to intercept and read Bob’s messages. Later, Bob realizes that his device never received a security warning.
Which of the following is the most likely
a) The attacker modified Bob’s public key and inserted their own during the key exchange. b) Bob’s device cached an older session key, allowing replay attacks. c) The attacker performed a chosen-ciphertext attack on the encrypted messages. d) The key exchange used a prime number that was too small, making it easy to compute discrete logarithms.
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!