We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 458e997 commit 34d0dcfCopy full SHA for 34d0dcf
1 file changed
crypto.rst
@@ -131,7 +131,10 @@ one). An attacker could be so lucky as to try the correct value
131
immediately, or so unlucky as to try every incorrect value before
132
finally trying the correct value of the key, having tried all 2\
133
:sup:`n` possible values; the average number of guesses to discover
134
-the correct value is halfway between those extremes, 2\ :sup:`n/2`.
+the correct value is halfway between those extremes,
135
+
136
+.. math:: 1/2 \times 2^n = 2^{n-1}
137
138
This can be made computationally impractical by choosing a
139
sufficiently large key space and by making the operation of checking a
140
key reasonably costly. What makes this difficult is that computing
0 commit comments