perezanthony1638 perezanthony1638
  • 20-07-2017
  • Computers and Technology
contestada

An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decryption efforts a/an __________ attack.

Respuesta :

tonb
tonb tonb
  • 20-07-2017
brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
Answer Link

Otras preguntas

What role did religion play in Maya life?
x^2 - 5x - 66 = 0 Factor and solve
What were the effects of isolationism and appeasement?
Laura and Brent paddled a canoe 6 miles upstream in four hours. The return trip took three hours. Find the rate at which Laura and Brent paddled the canoe is st
Who was Benjamin Franklin?
What were three developments in the arts during the Enlightenment?
_________ refers to material distributed by the advocates or opponents of a particular doctrine or cause. (Points : 5) Stereotype Propaganda Conflict Culture __
FOURTH AMENDMENT - In what circumstances is a search warrant not mandatory?
Why was the calendar important for the Maya religion?
What was the purpose of the League of Nations?