Investigatory Project Computer Science
Investigatory Project Computer Science
Title: Analyzing the Effectiveness of Strong vs Weak Passwords using a Brute Force Simulation
Abstract
This project investigates the effectiveness of different password strengths against brute-force
attacks. By simulating brute-force attempts on various password types, we analyze the time required
to crack them and determine best practices for creating secure passwords.
Introduction
Password security is a fundamental aspect of cybersecurity. Weak passwords can be easily
compromised, leading to data breaches and identity theft. This project explores how password
Objectives
- Simulate brute-force attacks on various password types.
guidelines recommend at least 12 characters using a mix of letters, numbers, and symbols.
Methodology
This project uses Python to simulate brute-force attacks. We test different types of passwords:
simple 4-digit PINs, 8-character lowercase words, and 10-character mixed-type passwords. We
take significantly longer. For example, a 4-digit PIN takes less than a second, while a 10-character
mixed password may take hours or days.
Conclusion
Strong passwords are exponentially more secure than weak ones. Users should use longer
Recommendations
- Always use at least 12 characters.
Bibliography
- NIST Password Guidelines