It is a most basic attack and it tries to attempt every possible key on the encoded text. Based on the key size it determines the total number of possible keys and tries all the possible keys against the encoded data.
Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile