brute force attack

(redirected from Brute-force attack)
Also found in: Wikipedia.

brute force attack

[¦brüt ¦fȯrs ə′tak]
(computer science)
An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

brute force attack

(cryptography)
A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher.

Breaking ciphers with many workstations.

brute force attack

The systematic, exhaustive testing of all possible methods that can be used to break a security system. For example, in cryptanalysis, trying all possible keys in the keyspace to decrypt a ciphertext. See dictionary attack. See also brute force programming.
References in periodicals archive ?
According to the report, while spearphishing remained popular, ransomware attacks increasingly targeted exposed remote access points, such as Remote Desktop Protocol (RDP); these credentials can be cracked through a brute-force attack or bought on the cybercriminal underground.
Password spraying is a type of brute-force attack in which a malicious actor uses a single password against targeted user accounts before moving on to attempt a second password, and so on.
He (https://www.zdnet.com/article/a-hacker-figured-out-how-to-brute-force-an-iphone-passcode/) explained the brute-force attack -  a method to gain access to anything that is password protected, as it tries various combinations of usernames and passwords again and again until it gets into the system - to ZDNet: "If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature." 
In a recent Microsoft survey conducted among regional security professionals during the company's CISO Executive Series roadshow, nearly half of respondents (49 per cent) said they did not have the capability to detect whether a user identity had been compromised following a phishing or brute-force attack, and 68 per cent said they could not track or revoke access to externally shared documents." - TradeArabia News Service
Developed in Japan and considered unbreakable by brute-force attack, the Camellia encryption algorithm is a welcome alternative to the more popular Advanced Encryption Standard (AES).
However, convergent encryption is vulnerable to brute-force attack. That is, convergent encryption can ensure confidentiality for only unpredictable data.
Experimental result shows an average of 50% increase in randomness of the generated keys which provides strong resistance against brute-force attack. In [17], the proposed technique applies error correction more effectively and provides a more balanced distribution of reliability and improved recognition rates.
But, the authors did not express their works on security issues such as brute-force attack, key space analysis, histogram analysis, pixel correlation, chaotic test, and entropy.
The attacker will clear the counter inside the VM and bypass the restriction and run the brute-force attack again [19].
When using symmetric ciphers, the most well known passive attack is a brute-force attack [5], the process of enumerating all of the possible keys until the proper key is found that decrypts a given cipher text into the correct plain text.
However, this authentication method has a high potential for being broken by brute-force attack because only four of the 16 displayed icons are actual authentication icons.