It just, like a “normal” brute force looks true a list of possibilities, however in just the square root of time you’d normally need.
Like I’ve said, the square root of the time an equivalent “normal” machine would need.
Such a thing only works if
a.) the system is noticing such an attack fast enough and
b.) the encryption isn’t done locally in a datacenter where this kind of information can simply be ignored.
Such software only helps if you own for example a server and want to keep a look on whether someone tries to access it, not for securing communication and encryption in general.