What Can It Be Called If An Attacker Determines The Private Key #973
What can it be called, if an attacker determines the private key of the user, after breaking the signature scheme?
This multiple choice question (MCQ) is related to the book/course gs gs123 Cryptography and Network Security. It can also be found in gs gs123 Wireless Lans Electronic Mail File Transfer - Digital Signatures - Quiz No.1.
What can it be called, if an attacker determines the private key of the user, after breaking the signature scheme?
Universal forgery
Total break
Selective forgery
Existential forgery
Similar question(s) are as followings:
Online Quizzes of gs123 Cryptography and Network Security
Application Layer - HTTP & FTP - Quiz No.1
gs gs123 Cryptography and Network Security
Online Quizzes