Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. this is referred to as ________.

Respuesta :

tonb
A brute force attack. Ciphers should be sufficiently complex for this to be ever successful.