An attacker has captured a target file that is encrypted with public key cryptography. Which of
the attacks below is likely to be used to crack the target file?

A.
Timing attack
B.
Replay attack
C.
Memory trade-off attack
D.
Chosen plain-text attack
Cracking the target file is just the first step in finding out the encryption, how about the second step in decrypting the file? Chosen cipher-text attack?