brute force attack


Also found in: Dictionary, Thesaurus, Medical, Legal, Wikipedia.

brute force attack

[¦brüt ¦fȯrs ə′tak]
(computer science)
An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

brute force attack

(cryptography)
A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher.

Breaking ciphers with many workstations.

brute force attack

The systematic, exhaustive testing of all possible methods that can be used to break a security system. For example, in cryptanalysis, trying all possible keys in the keyspace to decrypt a ciphertext. See dictionary attack. See also brute force programming.
References in periodicals archive ?
Enterprises -- and the companies that work for and with them -- need to be better prepared for this sort of brute force attack," added Holland.
The security analysis shows that the proposed scheme is resilient in opposition to brute force attacks, dictionary attacks, side channel attacks and spyware based recording attacks.
Chart presented in figure 1 [1] shows the daily massive brute force attacks during April 2016 on Websites using WordPress.
Mihailescu, "The fuzzy vault for fingerprints is vulnerable to brute force attack," in Proc.
Brute force attacks search for vulnerabilities and attack password-protection mechanisms.
These programs unleash the combined power of classic brute force attack, dictionary attack and precomputed hashes attack using rainbow tables to recover a user password for the corresponding databases.
Included in the premium version of Wordfence, the new feature is designed to simulate a brute force attack and allows WordPress publishers and admins to quickly verify the strength of user and admin-level passwords.
A dictionary attack will be carried out against WPA2-PSK, and subsequently a brute force attack, however, owing to the available resources a full scale brute force attack will not be carried out and as such only a proof of concept will be provided.
For example, an attacker can launch a brute force attack to guess a login password for VM, even if the guest
Instead, hackers look for and target the weakest link in network security against which to launch a brute force attack.
To test my theory I used a standard brute force attack against my email account and was able to penetrate in under 15 minutes.
The other state-of-the-art features include: random keypad, one-touch drive erase for rapid re-deployment using admin password, brute force attack detect/self destruct response and hardware based malware detection/deflection.