mybucks.online
  • Introduction
  • Concept
    • How it works?
    • Key generation
    • Architecture
    • Security Consideration
      • Brute Force Attack
      • Rainbow Tables
    • @mybucks.online/core
  • User Guide
    • Main Features
    • Transfer wallet using a URL
    • Supported Chains
    • Token listings
  • More
    • Security Audit
    • Roadmap
    • FAQs
    • About us
    • License
Powered by GitBook
On this page
  1. Concept
  2. Security Consideration

Brute Force Attack

This page outlines one of the major threats: Brute Force attacks.

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

In a brute force attack, attackers often use high-speed ASIC equipment, similar to Bitcoin mining machines. These devices are approximately (10^6) times faster than modern CPUs.

Assumptions

  • Character Set Size: 94 (26 uppercases + 26 lowercases + 10 digits + 32 special characters)

  • Password Length: 12 characters

  • scrypt Parameters: (N: 2^15, r: 8, p: 5)

  • scrypt Computation Time: Approximately 0.5 seconds on a modern CPU. For the sake of this analysis, we assume an ASIC speed-up factor of 10^6, making it 5 * 10^-7 seconds per computation.

Analysis

  • Size of Possible Password Space:

9412≈4.7×102394^{12} \approx 4.7 \times 10^{23}9412≈4.7×1023
  • Hashes per Second by Fastest ASIC:

Hashes per second=15×10−7=2×106 scrypt computations per second\text{Hashes per second} = \frac{1}{5 \times 10^{-7}} = 2 \times 10^6 \text{ scrypt computations per second}Hashes per second=5×10−71​=2×106 scrypt computations per second
  • Time to Brute Force:

Time (in seconds)=4.7×10232×106≈2.35×1017 seconds\text{Time (in seconds)} = \frac{4.7 \times 10^{23}}{2 \times 10^6} \approx 2.35 \times 10^{17} \text{ seconds}Time (in seconds)=2×1064.7×1023​≈2.35×1017 seconds
  • Convert Seconds to Years:

Years=2.35×101760×60×24×365≈7.54×109 years≈7.54 billion years\text{Years} = \frac{2.35 \times 10^{17}}{60 \times 60 \times 24 \times 365} \approx 7.54 \times 10^9 \text{ years} \approx 7.54 \text{ billion years}Years=60×60×24×3652.35×1017​≈7.54×109 years≈7.54 billion years

Even using the fastest known ASICs, a brute force attack would take approximately 7.54 billion years, making it impractical.

PreviousSecurity ConsiderationNextRainbow Tables

Last updated 9 months ago