45. What kind of attack makes the Caesar cipher virtually unusable?(A) Meet-in-the-middle attack(B) Escrow attack(C) Frequency analysis attack(D) Transposition attack