Final answer:
A related-key attack assumes that the attacker has access to several encryption functions with unknown keys but a known relationship between them.
Step-by-step explanation:
A) Related-key attack
In a related-key attack, the attacker is assumed to have access to multiple encryption functions, each with an unknown key. However, the keys of these functions have a known relationship. This knowledge of the key relationship allows the attacker to exploit vulnerabilities and decrypt encrypted data.
For example, suppose an attacker has access to two encryption functions that use related keys, and the attacker also has knowledge of the relationship between these keys. By exploiting this knowledge, the attacker can perform calculations to determine the original plaintext from the encrypted data.