189k views
5 votes
Although traffic analysis, tempest attacks, viruses and

Trojan horses are all useful techniques for gathering
information, cryptanalysts realize that their real goal is to
find a way of cracking the RSA cipher, the cornerstone of
modern encryption. The RSA cipher is used to protect the
most important military, diplomatie, commercial and
criminal communications - exactly the messages that
intelligence gathering organizations want to decipher.
- The Code Book,
Simon Singh
How is information presented in this passage?
Information is revealed chronologically.
Information is organized around the central idea that
the RSA cipher is extremely strong.
The text uses vivid descriptions with a storytelling
style to explain events,

User Evil Toad
by
5.4k points

2 Answers

3 votes

Answer:

The answer is B

Step-by-step explanation:

User Matt Moran
by
4.9k points
2 votes

Answer:

the Answer is B

Step-by-step explanation:

User Mikegreiling
by
5.7k points