Share This

A method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme. -Wikipedia.org

« Back to Glossary Index