brute force attack


Also found in: Dictionary, Thesaurus, Medical, Wikipedia.

brute force attack

[¦brüt ¦fȯrs ə′tak]
(computer science)
An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

brute force attack

(cryptography)
A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher.

Breaking ciphers with many workstations.

brute force attack

The systematic, exhaustive testing of all possible methods that can be used to break a security system. For example, in cryptanalysis, trying all possible keys in the keyspace to decrypt a ciphertext. See dictionary attack. See also brute force programming.
References in periodicals archive ?
Brute force attacks are typically defined as either ten or more successive failed attempts to log in in less than a minute, or 100 or more failed attempts in a 24-hour
Thus, no adversary who attempts to launch a brute force attack can generate the valid encryption key without the private key of the management server.
The generated keys are also resistant to brute force attack because they have long dimension keys and high entropy.
The security analysis shows that the proposed scheme is resilient in opposition to brute force attacks, dictionary attacks, side channel attacks and spyware based recording attacks.
Unfortunately, the default and most used username for administration is admin so this is the most used username for brute force attacks. Chart presented in figure 1 [1] shows the daily massive brute force attacks during April 2016 on Websites using WordPress.
These studies were unable to provide solutions that were resistant to brute force attacks because the attackers were still able to verify the authenticity of candidate points [3][8][14][15].
Brute force attacks search for vulnerabilities and attack password-protection mechanisms.
This would allow the FBI to use technology to rapidly and repeatedly test numbers in what's known as a brute force attack. In their filing Friday, prosecutors explained that investigators would be willing to work remotely to test passcodes, while Apple retained both possession of the phone and the technology itself.
Simply making passwords longer will exponentially increase the security against this common exploit known as a brute force attack (a sophisticated high-speed guessing process).
Included in the premium version of Wordfence, the new feature is designed to simulate a brute force attack and allows WordPress publishers and admins to quickly verify the strength of user and admin-level passwords.
For example, an attacker can launch a brute force attack to guess a login password for VM, even if the guest
Instead, hackers look for and target the weakest link in network security against which to launch a brute force attack. In most cases, it is typically the smaller IT networks of sub-contractors and other vendors who have connectivity to client systems through VPNs.