Key management
Brute-force attack
A5/1
EFF DES cracker
Cipher
Block cipher
Symmetric-key algorithm
Weak key
Advantage
Cryptography
Data Encryption Standard
Stream ciphers