{"id":244001,"date":"2023-05-10T14:13:35","date_gmt":"2023-05-10T11:13:35","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-the-yubikey-protects-against-brute-force-attacks-technicalities-of-attacks-and-key-encryption"},"modified":"2023-05-10T14:17:50","modified_gmt":"2023-05-10T11:17:50","slug":"how-the-yubikey-protects-against-brute-force-attacks-technicalities-of-attacks-and-key-encryption","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-the-yubikey-protects-against-brute-force-attacks-technicalities-of-attacks-and-key-encryption","title":{"rendered":"How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryption"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/05\/\u0410\u0442\u0430\u043a\u0438-\u0433\u0440\u0443\u0431\u043e\u0457-\u0441\u0438\u043b\u0438-\u043e\u0431\u043a\u043b\u0430\u0434\u0438\u043d\u043a\u0430-1.jpg&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-65px||||false|false&#8221; custom_padding=&#8221;||5%||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.20.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;62px||0px||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;45px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryption<\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;|0px||0px|false|false&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; width_tablet=&#8221;91%&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Brute force attacks are one of the most common hacking methods. It is considered one of the simplest, because in fact, in order to start an attack, an attacker only needs to know the login and have the appropriate software. The latter tests different combinations in turn. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Any password can be cracked this way, but the longer it is, the more time it will take for a hacker to penetrate. Although an attacker can speed up the operation by using heuristic optimization. <\/span><\/p>\n<p><b>What we will talk about:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#howtopracticebruteforceattack\"><span style=\"font-weight: 400;\">How a brute force attack works<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#attackoptimizationmethods\"><span style=\"font-weight: 400;\">Methods for optimizing a Brute Force attack<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#technicaltoolsforhackers\"><span style=\"font-weight: 400;\">Hacker&#8217;s technical tools<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#howtodefendagainstbruteforceattacks\"><span style=\"font-weight: 400;\">How to defend against brute force attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#thekeysofsecurityasthebesthelpersinthefaceofevil\"><span style=\"font-weight: 400;\">Security keys as the most reliable protection against burglary<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#findhomekeyfinders\"><span style=\"font-weight: 400;\">The most famous manufacturers of security keys<\/span><\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;howtopracticebruteforceattack&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; custom_padding=&#8221;55px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>How a brute force attack works<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the most common brute-force methods is called a \u201cdictionary attack\u201d. Its essence is to select combinations of different letters and numbers. Each password has a certain number of characters. Let&#8217;s denote it by N. Usually, passwords use all the letters of the Latin alphabet \u2013 that&#8217;s 26 characters. Each of the letters can be in upper or lower case. So that&#8217;s twice as much. And if you add numbers, that&#8217;s 10 more characters. So, we have the number of attempts:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">26<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><span style=\"font-weight: 400;\"> \u2014 if the password consists of small letters;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">36<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><span style=\"font-weight: 400;\"> \u2014 if the password consists of lowercase letters and numbers;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">52<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><span style=\"font-weight: 400;\"> \u2014 if the password consists of lowercase and uppercase letters;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">62<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><span style=\"font-weight: 400;\"> \u2014 if the password consists of lowercase and uppercase letters and numbers.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Let&#8217;s see how many attempts will result if the password consists of 6, 8, and 16 characters.<\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Number of attempts<\/b><\/td>\n<td><b>6 characters<\/b><\/td>\n<td><b>8 characters<\/b><\/td>\n<td><b>16 characters<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">26<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><\/td>\n<td><span style=\"font-weight: 400;\">308 915 776<\/span><\/td>\n<td><span style=\"font-weight: 400;\">208 827 064 576<\/span><\/td>\n<td><span style=\"font-weight: 400;\">43 608 742 899 428 874 059 776<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">36<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><\/td>\n<td><span style=\"font-weight: 400;\">2 176 782 336<\/span><\/td>\n<td><span style=\"font-weight: 400;\">2 821 109 907 456<\/span><\/td>\n<td><span style=\"font-weight: 400;\">7 958 661 109 946 400 884 391 936<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">52<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><\/td>\n<td><span style=\"font-weight: 400;\">19 770 609 664<\/span><\/td>\n<td><span style=\"font-weight: 400;\">53 459 728 531 456<\/span><\/td>\n<td><span style=\"font-weight: 400;\">2 857 942 574 656 970 690 381 479 936<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">62<\/span><span style=\"font-weight: 400;\"><sup><small>N<\/small><\/sup><\/span><\/td>\n<td><span style=\"font-weight: 400;\">56 800 235 584<\/span><\/td>\n<td><span style=\"font-weight: 400;\">218 340 105 584 896<\/span><\/td>\n<td><span style=\"font-weight: 400;\">47 672 401 706 823 533 450 263 330 816<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The number of attempts can also be increased by using special characters. But all the same, the computer is capable of processing several million passwords per second. But to crack 16-digit passwords, which consist of letters of various layouts and special symbols, an attacker may need several months. But, firstly, often to get a result, it is enough for the computer to make less than half of the attempts, and secondly, the hacker can optimize this process.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;attackoptimizationmethods&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Methods for optimizing a Brute Force attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Experienced hackers use various methods of optimization. The most famous of them are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">dictionary attack;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">rainbow tables;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">cryptanalysis;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">hybrid attacks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">increase in computer power.<\/span><\/li>\n<\/ul>\n<h3><b>Dictionary attack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A dictionary attack involves not only searching for<\/span> combinations of letters, but also <span style=\"font-weight: 400;\">using a dictionary with a list of familiar and popular passwords. It is common knowledge that users often use common words and phrases for passwords, which are easier to remember, than complex combinations. So usually users don&#8217;t generate passwords, they write one or two words and add a few numbers or symbols to the phrase to meet minimum password complexity requirements when registering on some server. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most often, hackers crack such passwords as <em>\u201c<\/em><\/span><i><span style=\"font-weight: 400;\"><em>Password123\u201d, \u201cmybirthday1707\u201d, \u201cSummer@2019\u201d, \u201c123456\u201d, \u201cpassword\u201d, \u201cqwerty\u201d<\/em> etc.<\/span><\/i><span style=\"font-weight: 400;\">Such passwords are easy to remember, but they are also very easy to crack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every experienced hacker has his own database of compromised passwords. It can also customize requests in the hacking program based on user information such as name, date of birth, favorite books or music. This can increase his chances of success. <\/span><\/p>\n<p><b>Tip for users:<\/b> <span style=\"font-weight: 400;\">to prevent hacking, do not use the same password for different accounts.<\/span> <\/p>\n<h3><b>Rainbow tables<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This method allows you to decrypt symmetric passwords using lookup tables (a way of organizing data on computers) if one of the passwords is known. You can also use this method to recover passwords created using a hash function \u2014 an algorithm that accepts an arbitrary amount of data and returns a string of the appropriate size.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/05\/phpThumb_generated_thumbnail.jpg&#8221; alt=&#8221;phpthumb generated thumbnail&#8221; title_text=&#8221;phpthumb generated thumbnail&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Cryptanalysis<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cryptanalysis is the process of studying ciphers in order to break them and gain access to encrypted messages. Cryptanalysts use various methods and techniques such as statistical analysis, repetition analysis, frequency charts, and computer algorithms to crack ciphers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cryptanalysis is an important component of cryptography and information security.<\/span><\/p>\n<h3><b>Hybrid attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hybrid attacks are a combination of two or more passwords cracking methods to increase the effectiveness of the attack. For example, this could be a combination of traffic interception, social engineering techniques, and the use of programs to crack passwords or cryptographic keys.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hybrid attacks are usually more complex and effective than individual attack methods because they can take advantage of each method to bypass security protections. These attacks can be used to break various types of protection, including two-factor authentication. Therefore, it is important to use a comprehensive approach to defense to make hybrid attacks more difficult and less effective.<\/span><\/p>\n<h3><b>Increasing computer power<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers can increase computing power for brute force attacks using various methods. Here are some of them:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use of botnets.<\/b><span style=\"font-weight: 400;\"> Attackers can use computer networks that have been infected with viruses to increase computing power by sending tasks to hacking botnets.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Using the GPU.<\/b><span style=\"font-weight: 400;\"> \u0414\u043b\u044f \u0437\u0431\u0456\u043b\u044c\u0448\u0435\u043d\u043d\u044f \u0448\u0432\u0438\u0434\u043a\u043e\u0441\u0442\u0456 \u043e\u0431\u0447\u0438\u0441\u043b\u0435\u043d\u044c \u043f\u0440\u0438 \u0437\u043b\u0430\u043c\u0443\u0432\u0430\u043d\u043d\u0456 \u043f\u0430\u0440\u043e\u043b\u0456\u0432 \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u0456 \u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0456 \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u0440\u0438 GPU. Multiple GPUs can be connected to a single computer or clustered to increase computing speed. <\/span><i><span style=\"font-weight: 400;\">For example, the ATI Radeon HD 4850 X2 video card is capable of generating up to 2.2 billion hashes per second!<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use of specialized servers.<\/b><span style=\"font-weight: 400;\"> Dedicated servers have powerful hardware and appropriate software. So if hackers have access to such equipment, it can be used to carry out attacks. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use of cloud services.<\/b><span style=\"font-weight: 400;\"> Cloud services usually have many computers, so they can also be used to increase computing power.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Increasing computer power can significantly speed up the process of cracking passwords, so it is important to use complex and long passwords and other protection methods to complicate such attacks.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;technicaltoolsforhackers&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Technical tools of hackers<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Hackers use various programs to pick passwords. Most famous of them:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>John the Ripper<\/b><span style=\"font-weight: 400;\"> is a free program that was created to help users recover lost passwords. But hackers are also very fond of this tool. The program is able to sort passwords both alphabetically and by dictionary \u2014 for this, it has the appropriate settings. The program runs on Unix OS. Can recover passwords by hashes \u2014 that is, by cryptographic signatures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Aircrack-ng \u2014 <\/b><span style=\"font-weight: 400;\">another free tool for hash and dictionary attacks. Has tools for decrypting passwords on Wi-Fi networks protected by WPA and WEP. It is considered one of the best. Works on Windows, UNIX, Linux and Mac OS X.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Rainbow Crack<\/b><span> \u2014 a tool that efficiently uses rainbow tables for attacks and reduces time spent testing different combinations with dictionary attacks. Works on Windows and Linux.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/05\/password_entry_amid_binary_code_by_matejmo.webp&#8221; alt=&#8221;password entry amid binary code by matejmo&#8221; title_text=&#8221;password entry amid binary code by matejmo&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;howtodefendagainstbruteforceattacks&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>How to defend against brute force attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are several methods to protect against brute force attacks. The choice of method depends on which accounts you are protecting \u2013 a business owner \/ developer account or a user account on a third-party service.<\/span><\/p>\n<p><b>For all types of accounts, the following precautions will help:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Create complex passwords<\/b><span style=\"font-weight: 400;\">that are 16 characters (or longer), in uppercase and lowercase, using numbers and special characters, and change them every month. <\/span><i><span style=\"font-weight: 400;\">Mnemonic phrases can be used for passwords, but they must be long and their context unknown to an attacker.<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Never <\/span><b>use the same password<\/b><span style=\"font-weight: 400;\"> for different services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use programs \u2013 password managers<\/b><span style=\"font-weight: 400;\">, to avoid remembering complex combinations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use two-factor authentication<\/b><span style=\"font-weight: 400;\"> \u2014 more about authentication methods in our article \u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/two-factor-authentication\"><span style=\"font-weight: 400;\">Two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/li>\n<\/ul>\n<p><b>Owners and developers can additionally use the following protection methods:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Banning access by IP<\/b> <span style=\"font-weight: 400;\">\u2014 if the alert system has detected hacking attempts from one IP, blocking the address will help prevent further hacking attempts for a while.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Set a password policy with complexity rules<\/b> <span style=\"font-weight: 400;\">\u2014 that is, prevent users from creating simple passwords when signing up.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Using a captcha<\/b> <span style=\"font-weight: 400;\">protects against bots, distinguishing the program from a person.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Limitation of account login attempts<\/b> <span style=\"font-weight: 400;\">\u2014 temporarily blocking users whose accounts are being hacked in order to prevent other hacking attempts and significantly reduce the possibility of passwords being guessed by software methods.<\/span><\/li>\n<\/ul>\n<h4><b>Use at least 128-bit or 256-bit password encryption<\/b> <span style=\"font-weight: 400;\">\u2013 Security keys can help with this.<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/05\/\u0430\u043f\u0430\u0440\u0430\u0442\u043d\u0456-\u043a\u043b\u044e\u0447\u0456-\u0431\u0435\u0437\u043f\u0435\u043a\u0438-1.jpg&#8221; alt=&#8221;hardware security keys&#8221; title_text=&#8221;hardware security keys&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;thekeysofsecurityasthebesthelpersinthefaceofevil&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Security keys as the most reliable safeguards against burglary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Security keys are hardware devices used to protect sensitive information (passwords, biometrics) through encryption and decryption. Encryption in security keys can be symmetric or asymmetric.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In symmetric encryption, the same key is used to encrypt and decrypt data. This approach is quite simple and fast, but the key must be securely stored so that attackers cannot obtain it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Asymmetric encryption uses a pair of keys \u2014 public and private. The public key can be shared, while the private key remains confidential. Data is encrypted using a public key, and decryption is performed using a private key. This approach is more reliable, since the private key remains only with the owner and cannot be obtained by outsiders.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security keys are used in many industries, including protection against unauthorized access to computer systems: protection of electronic payments, online transactions, personal data, etc.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;findhomekeyfinders&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>The most famous manufacturers of security keys<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are many manufacturers of security keys on the market. Here are some of the most famous and popular manufacturers:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Yubico<\/b><span style=\"font-weight: 400;\"> \u2014 a company that specializes in the production of hardware security keys <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">YubiKey<\/span><\/a> <b><i>with asymmetric encryption<\/i><\/b><span style=\"font-weight: 400;\">. These keys are used for authentication, encryption, and signing of data. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Gemalto <\/b><span style=\"font-weight: 400;\">\u2014 a company that produces hardware security keys and other products for protecting information. Gemalto&#8217;s products include SIM cards, secure USB drives and other solutions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>RSA Security<\/b><span style=\"font-weight: 400;\"> \u2014 a company specializing in cryptography and information protection. RSA Security makes software and hardware for data encryption, user authentication, and other purposes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Thales<\/b><span style=\"font-weight: 400;\"> \u2014 a company that manufactures hardware security keys used to secure electronic transactions, store sensitive information, authenticate users, and more.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Google<\/b><span style=\"font-weight: 400;\"> \u2014 produces the Titan hardware security keys used for two-factor authentication. Titan Security Keys can be used to secure Google, Dropbox, Facebook, and other online accounts.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/05\/\u0422\u043e\u043a\u0435\u043d\u0438.jpg&#8221; alt=&#8221;Tokens&#8221; title_text=&#8221;Tokens&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Benefits of YubiKey by Yubico<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As you may have noticed, YubiKey hardware keys are in first place among the most popular security keys. These are devices that provide two-factor authentication or (on some services) allow you to log in without a password. Here are some of the YubiKey&#8217;s benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>High level of security:<\/b><span style=\"font-weight: 400;\"> YubiKey uses strong encryption algorithms including AES-256, RSA 4096 and ECC P-256. They are also used to protect sensitive information, such as passwords and encryption keys.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ease of use:<\/b><span style=\"font-weight: 400;\"> The YubiKey is very simple to use. The key is connected to the USB port of a computer or mobile device and is confirmed with one click of a button.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cross-platform:<\/b> <span style=\"font-weight: 400;\">YubiKey is supported by most operating systems, including Windows, macOS, Linux, Android, and iOS.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>High reliability:<\/b><span style=\"font-weight: 400;\"> The YubiKey is made of high-quality materials and tested to meet safety standards. It has IP68 protection \u2014 waterproof and crush-resistant.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Support for public key standards:<\/b> <span style=\"font-weight: 400;\">YubiKey supports public key standards such as FIDO U2F and FIDO2, making it compatible with many services and applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Password optimization:<\/b> <span style=\"font-weight: 400;\">YubiKey can store encrypted passwords and be used as a password manager to automatically fill forms on web pages.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Overall, the YubiKey provides a high level of security and ease of use. This allows users to protect their sensitive information and accounts online with minimal effort. <\/span><\/p>\n<p><b><i>If you are interested in the opportunity to purchase keys, or want to learn more about them, we invite you to the page of our <\/i><\/b><a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><b><i>online store<\/i><\/b><\/a><b><i>, where you will find all the necessary information.<\/i><\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;honeycomb&#8221; background_pattern_color=&#8221;rgba(119,186,31,0.22)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;401&#8243; excerpt_length=&#8221;100&#8243; offset_number=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How the YubiKey protects against brute-force attacks: technicalities of attacks and key encryptionBrute force attacks are one of the most common hacking methods. It is considered one of the simplest, because in fact, in order to start an attack, an attacker only needs to know the login and have the appropriate software. The latter tests [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":244005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"How YubiKey protects against brute-force attacks","_seopress_titles_desc":"We tell you: how a brute force attack works, methods of optimizing a brute force attack, hacker technical tools, how to protect yourself from brute force attacks, security keys as the most reliable safeguards against hacking, the most famous manufacturers of security keys.\r\n","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-244001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/244001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=244001"}],"version-history":[{"count":4,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/244001\/revisions"}],"predecessor-version":[{"id":244008,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/244001\/revisions\/244008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/244005"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=244001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=244001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=244001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}