Misplaced Pages

Brute force attack

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by Kbh3rd (talk | contribs) at 16:25, 17 September 2004 (some rewording). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 16:25, 17 September 2004 by Kbh3rd (talk | contribs) (some rewording)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

In the field information system security a brute-force attack is a method to determine the key of an encrypted message. While simple to implement, it is a computationally expensive method of attack. A Brute-Force attack is similar to a Brute-force search.

The implementation of such an attack involves the generation of a series of keys either algorithmically or from a predetermined list. The latter is also known as a dictionary attack. The generated keys and the chosen cipher are applied to the message to produce a plain text. Each passage of plain text must be verified to determine if it is a valid and therefore properly decrypted message.

This is an extremely time-consuming task, the effort for which increases exponentially with the size of the key. Cracking a message with a relatively miniscule 6-digit alphanumeric key has 62 6 {\displaystyle 62^{6}} possible solutions, each of which must be run through the verfication process.

The benefit of a Brute-Force attack is that, eventually, the correct key will be produced.

Specifics of Brute-force methods can be found at Brute-force search.

Brute force attack Add topic