menu
Qammunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his dec…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his dec…
asked
Sep 7, 2018
155k
views
4
votes
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decryption efforts a/an __________ attack.
Computers & Tech
high-school
Prashant Nikam
asked
by
Prashant Nikam
8.4k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
Patrik Alexits
answered
Sep 12, 2018
by
Patrik Alexits
8.9k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Nov 2, 2018
39.7k
views
Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. this is referred to as ________.
Pdvries
asked
Nov 2, 2018
by
Pdvries
8.6k
points
Computers & Tech
college
1
answer
3
votes
39.7k
views
asked
Dec 17, 2021
94.1k
views
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of attack is Eve employing?
Adrian Solis
asked
Dec 17, 2021
by
Adrian Solis
8.3k
points
Computers & Tech
college
1
answer
5
votes
94.1k
views
asked
Jan 18, 2024
224k
views
Restoring encrypted information to the original message, commonly called plaintext, is? a. Encryption b. Encoding c. Decoding d. Decryption
Oluroyleseyler
asked
Jan 18, 2024
by
Oluroyleseyler
7.9k
points
Computers & Tech
high-school
1
answer
1
vote
224k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity.org