You can also decide the level of encryption from low; in which a nerd with some good software and enough time on their hands
could possibly
decrypt to high (128 bit) which would take a whole mountain of experts weeks to
decrypt if even then.
[
en
INTROCOMP
]
The attacker will not have the needed cryptographic key(s) to
decrypt the data stream from G, and will, therefore, be unable to do anything with the session.
[
en
CURTIN
]
If Caesar's enemies were able to get their hands on his "Key", it would have been mere child's play to
decrypt his messages and endanger his empire (sooner).
[
enKEYS TO THE KINGDOM ]
MCLH MEP AB AMG
05/07/2015
|
![]() |
![]() |