Casiopia Ahmed CFP1 Fall 2010
Friday, December 31, 2010
brute force attacks
28.) a strategy that can in theory be used against any encrypted data
by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his task easier
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment