Therearetwogeneralapproachestoattackinga()encryptionscheme.Thefirstattackisknownascryptanalysis.Cryptanalyticattacksrelyonthenatureofthealgorithmplusperhapssomeknowledgeofthegeneralcharacteristicsofthe(请作答此空)orevensomesampleplaintext-ciphertextpairs.Thistypeof()exploitsthecharacteristicsofthealgorithmtoattempttodeduceaspecificplaintextortodeducethekeybeingused.Iftheattacksucceedsindeducingthekey,theeffectiscatastrophic:Allfutureandpastmessagesencryptedwiththatkeyarecompromised.Thesecondmethod,knownasthe()-forceattack,istotryeverypossiblekeyonapieceof()untilanintelligibletranslationintoplaintextisobtained.Onaverage,halfofallpossiblekeysmustbetriedtoachievesuccess.
A.operation B.publication C.plaintext D.ciphertext正确答案C