Brute Force Attack
This page outlines one of the major threats: Brute Force attacks.
Last updated
This page outlines one of the major threats: Brute Force attacks.
Last updated
In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
In a brute force attack, attackers often use high-speed ASIC equipment, similar to Bitcoin mining machines. These devices are approximately (10^6) times faster than modern CPUs.
Character Set Size: 94 (26 uppercases + 26 lowercases + 10 digits + 32 special characters)
Password Length: 12 characters
scrypt Parameters: (N: 2^15, r: 8, p: 5)
scrypt Computation Time: Approximately 0.5 seconds on a modern CPU. For the sake of this analysis, we assume an ASIC speed-up factor of 10^6
, making it 5 * 10^-7
seconds per computation.
Size of Possible Password Space:
Hashes per Second by Fastest ASIC:
Time to Brute Force:
Convert Seconds to Years:
Even using the fastest known ASICs, a brute force attack would take approximately 7.54 billion years, making it impractical.