Digital Repository

Evaluation of brute-force techniques to improve the defense against brute-force induced attacks

Show simple item record

dc.contributor.author Dissanayake, D.D.M.S.M.B.
dc.date.accessioned 2023-01-26T05:46:09Z
dc.date.available 2023-01-26T05:46:09Z
dc.date.issued 2022
dc.identifier.citation Dissanayake,, D.D.M.S.M.B. (2022) Evaluation of brute-force techniques to improve the defense against brute-force induced attacks. BSc. Dissertation, Informatics Institute of Technology en_US
dc.identifier.issn 20200148
dc.identifier.uri http://dlib.iit.ac.lk/xmlui/handle/123456789/1536
dc.description.abstract If someone wants to securely store data indefinitely, it is nothing more than encrypting it with a key. However, this has its own limitations where an attacker could try many keys until he/she breaks the encryption directly by guessing the right key. Year by year, the processing power increases from mobile processors to quantum computers. And the brute-force attack on encrypted data is also consuming very less time in the current state; compared with the techniques, technologies and resources used in earlier years. And in the future, in the worst case, there will be a time, where the HTTPS traffic might be brute-forced in a considerable time. The real threat of this is, the brute-force attacks are completely relying on the processing power rather than the attacker’s skills. Alternative strategies must be taken into consideration in order to prevent or at least minimise being exposed to brute-force assaults as processing power grows dramatically over time, along with cloud and distributed computing. The goal of this research is to develop a brute-force prevention technique regardless of encryption standard that will at the very least guarantee that the encrypted content cannot be decrypted throughout the typical human lifetime, regardless of how powerful the CPU or GPU is. en_US
dc.language.iso en en_US
dc.subject Brute-force en_US
dc.subject Cryptography en_US
dc.subject Encryption en_US
dc.title Evaluation of brute-force techniques to improve the defense against brute-force induced attacks en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account