What could happen if an attacker were to plant a virus on a system that encrypted data in software?
Select one:
a. The virus could interfere with the encryption process
b. The virus could potentially discover the encryption key
c. Both A and B
d. None of the above