For this question, we're just going to discuss threat models and the one-time pad from Unit 1.
In order to know that a one-time pad provides confidentiality,
which of these do we need to assume about the adversary?
Is it necessary that an attacker has limited computational power?
Is it necessary that the attacker doesn't know anything about the key?
Or it is necessary that the attacker cannot modify the message?
Check all that apply.
