Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. this is referred to as ________.

Q&A Platform for Education
Platform Explore for Education