CAPEC 20 Encryption Brute Forcing

Draft Standard Low Risk
Severity Low

Description

An attacker, armed with the cipher text and the encryption algorithm used, performs an exhaustive (brute force) search on the key space to determine the key that decrypts the cipher text to obtain the plaintext.

Attack Execution Flow

2

Mitigations

2

Consequences

Indicators

1

Relationships

Resources Required

1