The Distributed
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Archive
No Result
View All Result
The Distributed
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Archive
No Result
View All Result
The Distributed
No Result
View All Result
Home Learn The Technology

Brute-Force Attack

by The Distributed Team
February 11, 2022 - Updated on June 12, 2022
in The Technology
Brute Force Attack: Exhaustive Key Search

A Brute-Force attack, also known as exhaustive key search, is a hack using complex algorithms attempting to crack a password or key by trial and error to find the correct plaintext or password. As the password’s length increases, the amount of time needed to find the correct password increases exponentially.

Brute-Force Attacks are often made less effective by the use of obfuscating or complicating the data to be encoded. This makes it harder for an attacker to recognize when they’ve cracked the key, in turn making it more work and extending the computational power needed.

The amount of time needed to crack the key depends on the size of the key. The theorized time it will take for any algorithm to crack the key is used as a metric to test the strength of the system, a larger key system in turn exponentially increases the resources required for an attack. The maximum number of attempts to crack the key is equal to 2^key size, key size representing bits.

As bigger key sizes mean better security, cryptographic keys have increased in size. Currently, most cryptographic algorithms like Bitcoin use SHA-256 as it is a system using 256 bit-keys.

Tags: Brute-Force AttackKeys

Most Read

The Technology

Brute-Force Attack

February 11, 2022 - Updated on June 12, 2022
Artificial Intelligence

Top Canadian Media Outlets Sue OpenAI In Copyright Case Potentially Worth Billions

December 5, 2024
Artificial Intelligence

Introducing Deep Research: OpenAI’s Launches New Agentic Tool In ChatGPT

February 21, 2025
Artificial Intelligence

Using AI To Create A Sustainable Future: Microsoft Teams Up With Leading Energy Company

October 11, 2024
Cryptocurrencies

Crypto Skyrocketed In May As Bitcoin Gained Institutional, Regulatory Backing – Report

June 16, 2025

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

Twitter Instagram Youtube LinkedIn Facebook RSS
ADVERTISEMENT
The Distributed

  • About The Distributed
  • Terms
  • Contact
  • Privacy
  • Editorial
  • Careers
  • RSS Feed

© 2023 The Distributed

No Result
View All Result
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Learn
    • The Coins
    • The Future
    • The Innovations
    • The Technology
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Research
  • Reviews
    • Exchanges
    • Wallets
  • Headlines
  • About Us
  • Contact Us

© 2023 The Distributed

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.