Answer:
C15H24O
Explanation:
n(C) = 4.497 g/44g/mol = 0.1022
Mass of C = 0.1022 × 12 = 1.226 g
n(H) = 1.473g/18 g/mol = 0.0823 ×2 moles = 0.165 moles
Mass of H = 0.0823 × 2 ×1 = 0.165g
Mass of O= 1.501 -(1.226 + 0.165)
Mass of O= 0.11 g
Number of moles of O = 0.11g/16g/mol = 0.0069 moles
Dividing through by the lowest ratio;
0.1022/0.0069, 0.165/0.0069, 0.0069/0.0069
15, 24, 1
Hence the formula is;
C15H24O
Answer
The formula is C1SH240
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.
Answer:
chosen ciphertext
Explanation:
Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.
Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.
Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.Hence, chosen ciphertext attempts the use of modular exponentiation.
Learn more : https://brainly.com/question/14826269