4:59
Stop
CEH - Cryptography - Cryptanalysis
Expert
1/5
You are a security consultant investigating a breach at a cryptocurrency exchange. The attackers successfully accessed encrypted wallet keys stored in a database. Forensic analysis reveals that the encryption algorithm used was AES-256 in CBC mode, but the same initialization vector (IV) was reused for encrypting all wallet keys. Additionally, you discover that parts of the plaintext structure of the wallet keys follow a consistent format. What cryptanalytic attack would be most effective in this scenario?
Expert