Misplaced Pages

Brute force attack: Difference between revisions

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 16:55, 17 September 2004 editKbh3rd (talk | contribs)Extended confirmed users31,490 editsm external link to an example of a successful brute-force challenge project← Previous edit Latest revision as of 19:06, 30 January 2022 edit undoTavix (talk | contribs)Autopatrolled, Administrators75,478 edits R with history 
(12 intermediate revisions by 10 users not shown)
Line 1: Line 1:
#REDIRECT ]
In the field information system security a '''brute-force attack''' is a method to determine the ] of an ]. While simple to implement, it is a ] method of attack. A brute-force attack is similar to a ].


{{R from other hyphenation}}
The implementation of such an attack involves the generation of a series of keys either ]ically or from a predetermined list. The latter is also known as a ]. <!-- IMHO a dictionary attack and a brute-force attack are two separate things. kbh3rd --> The generated keys and the chosen ] are applied to the message to produce a ]. Each passage of ] must be ] to determine if it is a valid and therefore properly decrypted message.
{{R with history}}

This is an extremely time-consuming task, the effort for which increases exponentially with the size of the key. Cracking a message with a relatively miniscule 6-digit ] key has <math>62^6</math> possible solutions, each of which must be run through the verfication process.

The benefit of a brute-force attack is that, given enough time, the correct key is guaranteed to be found. The relative security of a ] system can be measured by the ] time required to find a key by brute force, and the security of an encrypted message may be expressed as the expected number of years required to thus determine its encryption key. This time decreases with increases in the power of computers. The decreasing cost and increasing power of computing resources has caused the ] to propose withdrawing the 56-]-keyed ] as an encryption standard in ].

==See also==
* ].

==External links==
*

Latest revision as of 19:06, 30 January 2022

Redirect to:

  • With history: This is a redirect from a page containing substantive page history. This page is kept as a redirect to preserve its former content and attributions. Please do not remove the tag that generates this text (unless the need to recreate content on this page has been demonstrated), nor delete this page.
    • This template should not be used for redirects having some edit history but no meaningful content in their previous versions, nor for redirects created as a result of a page merge (use {{R from merge}} instead), nor for redirects from a title that forms a historic part of Misplaced Pages (use {{R with old history}} instead).
Brute force attack: Difference between revisions Add topic