menu
Qammunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decr…
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decr…
asked
Sep 7, 2018
154k
views
4
votes
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decryption efforts a/an __________ attack.
Computers and Technology
high-school
Prashant Nikam
asked
by
Prashant Nikam
8.4k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
Patrik Alexits
answered
Sep 12, 2018
by
Patrik Alexits
8.9k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Nov 2, 2018
39.7k
views
Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. this is referred to as ________.
Pdvries
asked
Nov 2, 2018
by
Pdvries
8.6k
points
Computers and Technology
college
1
answer
3
votes
39.7k
views
asked
Dec 17, 2021
94.1k
views
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of attack is Eve employing?
Adrian Solis
asked
Dec 17, 2021
by
Adrian Solis
8.3k
points
Computers and Technology
college
1
answer
5
votes
94.1k
views
asked
Jan 18, 2024
224k
views
Restoring encrypted information to the original message, commonly called plaintext, is? a. Encryption b. Encoding c. Decoding d. Decryption
Oluroyleseyler
asked
Jan 18, 2024
by
Oluroyleseyler
7.9k
points
Computers and Technology
high-school
1
answer
1
vote
224k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity.org