Encryption to use when limited data for a chosen plaintext attack is available
Consider the following use case:
User can choose a key.
The key is used to encrypt files to be stored on a server.
Some file and directory names are easily guessed from the nature of the software, some are not and those shall be encrypted… Continue reading Encryption to use when limited data for a chosen plaintext attack is available