Brute-force attacks are the simplest form of attack against a cryptographic system. In a brute-force attack, the attacker simply guesses repeatedly at the encryption key until he or she stumbles upon the correct value for the key, gaining access to the encrypted information. In this video, learn how attackers wage brute-force attacks and how security professionals can protect against them.
- [Instructor] As long as cyber security experts…have used encryption to protect sensitive information,…attackers have sought to undermine that security…and gain unauthorized access to that protected information.…Over the centuries attackers have developed…a number of techniques designed…to help them crack cryptographic algorithms.…Brute-force attacks are the simplest form of attack…against a cryptographic system.…In a brute-force attack, the attacker simply guesses…repeatedly at the encryption key until he or she…stumbles upon the correct value for the key…and gains access to the encrypted information.…
Of course, guessing isn't easy, and brute-force attacks…can take a very long time to complete successfully,…if they ever succeed.…Brute-force attacks require very little information to wage.…The attacker simply needs to have an example…of encrypted ciphertext.…For this reason, brute-force attacks are also called…known ciphertext attacks.…Earlier in this course, I shared the example…of a simple shift cipher.…It simply moves each of the letters of the alphabet…
Author
Updated
8/28/2020Released
3/8/2018Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx. You can also join Mike's free study group at certmike.com.
- Understanding security design principles and models
- Cloud computing and virtualization
- Hardware security
- Client and server vulnerabilities
- Web security vulnerabilities
- Securing mobile devices and smart devices
- Understanding encryption
- Symmetric and asymmetric cryptography
- Key management and public key infrastructure
- Physical security
Skill Level Advanced
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Your security architecture2m 38s
-
-
1. Security Engineering
-
Secure design principles5m 18s
-
Security models4m 14s
-
Security requirements3m 25s
-
-
2. Cloud Computing and Virtualization
-
Virtualization4m 20s
-
Cloud computing models3m 44s
-
Public cloud tiers5m 35s
-
-
3. Hardware Security
-
Memory protection3m 20s
-
Interface protection4m 10s
-
-
4. Client and Server Vulnerabilities
-
Client security issues6m 16s
-
Server security issues4m 25s
-
NoSQL databases6m 53s
-
-
5. Web Security
-
OWASP top ten4m 52s
-
SQL Injection prevention5m 20s
-
Fuzz testing6m 44s
-
Session hijacking3m 50s
-
-
6. Mobile Security
-
Mobile device security2m 35s
-
Mobile device management6m 14s
-
Mobile device tracking3m 14s
-
Mobile application security4m 23s
-
Bring your own device (BYOD)4m 47s
-
-
7. Smart Device Security
-
Industrial control systems4m 36s
-
Smart home technology3m 6s
-
-
8. Encryption
-
Understanding encryption3m 24s
-
Goals of cryptography2m 49s
-
Codes and ciphers3m 20s
-
The cryptographic life cycle2m 49s
-
Digital rights management2m 17s
-
-
9. Symmetric Cryptography
-
3DES3m 35s
-
AES, Blowfish, and Twofish6m 40s
-
RC42m 23s
-
Steganography4m 55s
-
10. Asymmetric Cryptography
-
Rivest-Shamir-Adleman (RSA)3m 26s
-
PGP and GnuPG11m 9s
-
-
11. Key Management
-
Key exchange3m 4s
-
Diffie-Hellman5m 12s
-
Key escrow3m 13s
-
Key stretching1m 55s
-
-
12. Public Key Infrastructure
-
Trust models3m 1s
-
PKI and digital certificates4m 28s
-
Hash functions9m 11s
-
Digital signatures4m 4s
-
Create a digital certificate4m 33s
-
Revoke a digital certificate1m 48s
-
-
13. Cryptanalytic Attacks
-
Brute-force attacks3m 12s
-
Knowledge-based attacks2m 10s
-
-
14. Physical Security
-
Site and facility design3m 7s
-
Physical access control3m 58s
-
Visitor management1m 35s
-
-
Conclusion
-
Next steps41s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Brute-force attacks