Which cryptography attack is the student attempting in the following situation: A computer science student must fill out a secure Adobe PDF job application that was sent to them by a prospective employer. Rather than requesting a new document that would allow the forms to be completed, the student chooses to develop a script that picks passwords from a list of often used passwords and attempts them against the encrypted PDF until the proper password is found or the list is exhausted.
Comments