Brute Force attacks

As the name suggests, this approach involves trying all possible keys until one which produces a resonable plaintext is found. On average of course this means trying half of all possible keys.

Logically, this method becomes progressively more unfeasible as the key size increases.