What are the potential limitations of Electronic Code Book (ECB)?   Question 13 options:   If one ciphertext block is corrupted during the transmission, all subsequent ciphertext blocks cannot be decrypted unless until corrupted block is successfully retransmitted.    If the same message (e.g., an SSN) is encrypted (with the same key) and sent twice, their ciphertexts are the same.   It needs an initialization vector to operate.   Repetitive patterns contained in the plaintext may be revealed in the ciphertext, if aligned with blocks.

icon
Related questions
Question

What are the potential limitations of Electronic Code Book (ECB)?

 

Question 13 options:

 

If one ciphertext block is corrupted during the transmission, all subsequent ciphertext blocks cannot be decrypted unless until corrupted block is successfully retransmitted. 

 

If the same message (e.g., an SSN) is encrypted (with the same key) and sent twice, their ciphertexts are the same.

 

It needs an initialization vector to operate.

 

Repetitive patterns contained in the plaintext may be revealed in the ciphertext, if aligned with blocks.

AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
steps

Unlock instant AI solutions

Tap the button
to generate a solution