brute force attack


Also found in: Dictionary, Thesaurus, Medical, Wikipedia.

brute force attack

[¦brüt ¦fȯrs ə′tak]
(computer science)
An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

brute force attack

(cryptography)
A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher.

Breaking ciphers with many workstations.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

brute force attack

The systematic and exhaustive testing of all possible combinations of keys or passwords that can be used to break a security system. For example, if the username of an account is known, the brute force attack attempts to find the password. In a reverse brute force attack, the password is known and the brute force method tries to find the username. See dictionary attack. See also brute force programming.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Brute force attacks are typically defined as either ten or more successive failed attempts to log in in less than a minute, or 100 or more failed attempts in a 24-hour
Thus, no adversary who attempts to launch a brute force attack can generate the valid encryption key without the private key of the management server.
The generated keys are also resistant to brute force attack because they have long dimension keys and high entropy.
The security analysis shows that the proposed scheme is resilient in opposition to brute force attacks, dictionary attacks, side channel attacks and spyware based recording attacks.
Unfortunately, the default and most used username for administration is admin so this is the most used username for brute force attacks. Chart presented in figure 1 [1] shows the daily massive brute force attacks during April 2016 on Websites using WordPress.
These studies were unable to provide solutions that were resistant to brute force attacks because the attackers were still able to verify the authenticity of candidate points [3][8][14][15].
Brute force attacks search for vulnerabilities and attack password-protection mechanisms.
This would allow the FBI to use technology to rapidly and repeatedly test numbers in what's known as a brute force attack. In their filing Friday, prosecutors explained that investigators would be willing to work remotely to test passcodes, while Apple retained both possession of the phone and the technology itself.
Simply making passwords longer will exponentially increase the security against this common exploit known as a brute force attack (a sophisticated high-speed guessing process).
Included in the premium version of Wordfence, the new feature is designed to simulate a brute force attack and allows WordPress publishers and admins to quickly verify the strength of user and admin-level passwords.
For example, an attacker can launch a brute force attack to guess a login password for VM, even if the guest
Instead, hackers look for and target the weakest link in network security against which to launch a brute force attack. In most cases, it is typically the smaller IT networks of sub-contractors and other vendors who have connectivity to client systems through VPNs.