Computers and Technology
jurneehelp
2016-04-09 22:30:51
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a sensible message. it is appropriate to call his decryption efforts a/an __________ attack.
ADD ANSWER