Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext
Describe how the OFB mode can be attacked if the IV is not different for each execution of the encryption operation.