Friday, December 31, 2010

brute force attacks

28.) a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his task easier

No comments:

Post a Comment