100% found this document useful (1 vote)
23 views3 pages

Investigatory Project Computer Science

This project analyzes the effectiveness of strong versus weak passwords against brute-force attacks by simulating attempts on various password types. Results indicate that weak passwords can be cracked in seconds, while strong passwords take significantly longer, emphasizing the importance of password complexity. Recommendations include using at least 12 characters with a mix of character types and utilizing password managers for enhanced security.

Uploaded by

dhanunathi2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
23 views3 pages

Investigatory Project Computer Science

This project analyzes the effectiveness of strong versus weak passwords against brute-force attacks by simulating attempts on various password types. Results indicate that weak passwords can be cracked in seconds, while strong passwords take significantly longer, emphasizing the importance of password complexity. Recommendations include using at least 12 characters with a mix of character types and utilizing password managers for enhanced security.

Uploaded by

dhanunathi2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Investigatory Project in Computer Science

Title: Analyzing the Effectiveness of Strong vs Weak Passwords using a Brute Force Simulation

Name: [Your Name Here]

School/College: [Your School Name]

Instructor: [Instructor Name]

Date: April 2025


Acknowledgment
I would like to thank my Computer Science teacher for guiding me throughout this project. I am also

grateful to my family and friends who supported and encouraged me.

Abstract
This project investigates the effectiveness of different password strengths against brute-force

attacks. By simulating brute-force attempts on various password types, we analyze the time required

to crack them and determine best practices for creating secure passwords.

Introduction
Password security is a fundamental aspect of cybersecurity. Weak passwords can be easily

compromised, leading to data breaches and identity theft. This project explores how password

complexity affects its security.

Statement of the Problem


Are strong passwords significantly more secure than weak ones in real-world brute-force scenarios?

Objectives
- Simulate brute-force attacks on various password types.

- Measure the time taken to crack each type.

- Compare results to evaluate password strength.

Review of Related Literature


Previous research shows that longer and more complex passwords are harder to crack. NIST

guidelines recommend at least 12 characters using a mix of letters, numbers, and symbols.

Methodology
This project uses Python to simulate brute-force attacks. We test different types of passwords:

simple 4-digit PINs, 8-character lowercase words, and 10-character mixed-type passwords. We

record the average time to crack each.

Results and Discussion


Our results show that short and simple passwords can be cracked in seconds, while complex ones

take significantly longer. For example, a 4-digit PIN takes less than a second, while a 10-character
mixed password may take hours or days.

Conclusion
Strong passwords are exponentially more secure than weak ones. Users should use longer

passwords with a mix of character types to protect their data.

Recommendations
- Always use at least 12 characters.

- Include uppercase, lowercase, numbers, and symbols.

- Use a password manager to handle complex passwords.

Bibliography
- NIST Password Guidelines

- OWASP Authentication Cheat Sheet

- Articles from cybersecurity blogs and journals

You might also like