brute force attack

(redirected from Brute-force attack)
Also found in: Wikipedia.

brute force attack

[¦brüt ¦fȯrs ə′tak]
(computer science)
An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

brute force attack

(cryptography)
A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher.

Breaking ciphers with many workstations.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

brute force attack

The systematic and exhaustive testing of all possible combinations of keys or passwords that can be used to break a security system. For example, if the username of an account is known, the brute force attack attempts to find the password. In a reverse brute force attack, the password is known and the brute force method tries to find the username. See dictionary attack. See also brute force programming.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
According to the report, while spearphishing remained popular, ransomware attacks increasingly targeted exposed remote access points, such as Remote Desktop Protocol (RDP); these credentials can be cracked through a brute-force attack or bought on the cybercriminal underground.
He (https://www.zdnet.com/article/a-hacker-figured-out-how-to-brute-force-an-iphone-passcode/) explained the brute-force attack -  a method to gain access to anything that is password protected, as it tries various combinations of usernames and passwords again and again until it gets into the system - to ZDNet: "If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature." 
In a recent Microsoft survey conducted among regional security professionals during the company's CISO Executive Series roadshow, nearly half of respondents (49 per cent) said they did not have the capability to detect whether a user identity had been compromised following a phishing or brute-force attack, and 68 per cent said they could not track or revoke access to externally shared documents." - TradeArabia News Service
Developed in Japan and considered unbreakable by brute-force attack, the Camellia encryption algorithm is a welcome alternative to the more popular Advanced Encryption Standard (AES).
However, convergent encryption is vulnerable to brute-force attack. That is, convergent encryption can ensure confidentiality for only unpredictable data.
Experimental result shows an average of 50% increase in randomness of the generated keys which provides strong resistance against brute-force attack. In [17], the proposed technique applies error correction more effectively and provides a more balanced distribution of reliability and improved recognition rates.
But, the authors did not express their works on security issues such as brute-force attack, key space analysis, histogram analysis, pixel correlation, chaotic test, and entropy.
The attacker will clear the counter inside the VM and bypass the restriction and run the brute-force attack again [19].
When using symmetric ciphers, the most well known passive attack is a brute-force attack [5], the process of enumerating all of the possible keys until the proper key is found that decrypts a given cipher text into the correct plain text.
However, this authentication method has a high potential for being broken by brute-force attack because only four of the 16 displayed icons are actual authentication icons.