perezanthony1638 perezanthony1638
  • 20-07-2017
  • Computers and Technology
contestada

An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decryption efforts a/an __________ attack.

Respuesta :

tonb
tonb tonb
  • 20-07-2017
brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
Answer Link

Otras preguntas

name one situation in which gravitational potential energy might be useful and one where it might be dangerous
In his frequent speeches, the Reverend Dr. Jesse Jackson has been a ___ defender of African-American rights. A. tangible B. advocate C. tangent D. vociferous
Find the volume of a triangular prism with the following dimensions. Round to the nearest whole number. Triangle base - 9ft triangle height - 4ft prism height-9
Which of the following political offices was part of the first territorial government? A. supreme court judge B. county commissioner C. mayor D. lieutenant gove
What is happening in the diagram?
look at my the expression below. 1/2 (a+b) - (a-b)2 what is the value of the expression when a= 18 and b =14?
Who is the national hero of Cuba? a. Columbus c. Fidel Castro b. José Martí d. Ramon Cortez
use Vietnamization in a sentence
easy way to memorize the Canadian charter of Rights and Freedoms
Which word has incorrect capitalization? That Hemingway novel is set during the spanish Civil War. novel spanish Hemingway That