Topic: The experiment will be used to determine the effectivity of several lengths and arrangements of encryptions.
Introduction: In this age of revolutionary technologies, our lives are essentially saved to the Internet and upon electronic devices. Our most personal informations and even our secrets are preserved in a digital format on various hard drives and storages across the globe. These devices, if not properly secured, are accessible to practically anyone. In order to protect our information, we create passwords that allow us-and us alone-to view our most private data, similar to the way in which one would have a key to a safety deposit box with valuables stored carefully within. However, much like any lock and key in existence, the security provided by such a password is not guaranteed. Those with the right resources and knowledge may have the ability to bypass the aforementioned security measures and obtain access to your files. A common method of accomplishing this task is the process of rapidly submitting a variety of possible passwords and seeing which of them is the correct one; an exhaustive but essentially simple sequence known as brute-forcing. Years ago, before the advancement of the computer, one would have to manually try each and every possible combination or likely password. Today, …show more content…
The reason for this is to make brute-forcing a password as difficult as possible, aside from the obvious possibility of someone guessing your authentication phrase. Similar to how you would hide personal belongings in inconspicuous places. So yes, it is indeed true that the lengths and the combinations of characters you use in your passwords are very influential on the length of time it takes to break