A form of brute force attack where the key used for the encryption of messages is found by decrypting messages that have been encrypted with every possible key that could have been used. The longer and more complicated the key, the longer it takes to find it. As computers become more powerful, such attacks become more and more feasible, and considerable research has been carried out by cryptographers to devise more and more powerful encryption technologies that are resistant to this attack.