Consider the code in Table 11.5, which is susceptible to a linearization attack. Suppose that we modify the program as follows:
Note that we never break out of the for loop early, yet we can still determine whether the correct serial number was entered. Is this version of the program immune to a linearization attack? Explain.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here