Therearetwogeneralapproachestoattackinga(请作答此空)encryptionscheme.Thefirstattackisknownascryptanalysis.Cryptanalyticattacksrelyonthenatureofthealgorithmplusperhapssomeknowledgeofthegeneralcharacteristicsofthe()orevensomesampleplaintext-ciphertextpairs.Thistypeof()exploitsthecharacteristicsofthealgorithmtoattempttodeduceaspecificplaintextortodeducethekeybeingused.Iftheattacksucceedsindeducingthekey,theeffectiscatastrophic:Allfutureandpastmessagesencryptedwiththatkeyarecompromised.Thesecondmethod,knownasthe()-forceattack,istotryeverypossiblekeyonapieceof()untilanintelligibletranslationintoplaintextisobtained.Onaverage,halfofallpossiblekeysmustbetriedtoachievesuccess.
A.stream B.symmetric C.asymmetric D.advanced正确答案B