0% found this document useful (0 votes)
38 views19 pages

Analysing The Impact of Password Length and Complexity On The Effectiveness of Brute Force Attacks

This study analyzes how password length and complexity affect the effectiveness of brute force attacks, emphasizing that stronger passwords significantly delay unauthorized access attempts. It highlights the importance of incorporating various character types and increasing password length to enhance security against automated cracking. The research combines theoretical analysis with practical simulations to provide recommendations for creating robust password policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views19 pages

Analysing The Impact of Password Length and Complexity On The Effectiveness of Brute Force Attacks

This study analyzes how password length and complexity affect the effectiveness of brute force attacks, emphasizing that stronger passwords significantly delay unauthorized access attempts. It highlights the importance of incorporating various character types and increasing password length to enhance security against automated cracking. The research combines theoretical analysis with practical simulations to provide recommendations for creating robust password policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.

2, March 2025

ANALYSING THE IMPACT OF PASSWORD LENGTH


AND COMPLEXITY ON THE EFFECTIVENESS OF
BRUTE FORCE ATTACKS
Lama A. AlMalki 1, Samah H. Alajmani 1 , Ben Soh 2 and Raneem Y. Alyami 1
1
Department of Computers and Information Technology, Taif University,
Taif City, KSA
2
Department of Computer Science and Information Technology,
La Trobe University, Melbourne, Australia

ABSTRACT
This study investigates the critical role of password length and complexity in mitigating the effectiveness of
brute force attacks, a prevalent method used by attackers to gain unauthorized access to systems.
Passwords are the first line of defense in digital security, and their strength directly affects the time and
resources required for a brute-force attack to be successful. The research explores the relationship between
various password characteristics such as length, the inclusion of alphanumeric characters, special
symbols, and case sensitivity and the resistance they provide against automated cracking attempts.
Through a combination of theoretical analysis and practical simulation, the study demonstrates how even a
small increase in password length can lead to exponential growth in the number of possible combinations,
significantly delaying potential breaches.

KEYWORDS
Password security, brute force attacks, password length, password complexity, cybersecurity

1. INTRODUCTION
In our digital age, passwords play a crucial role in cybersecurity, safeguarding sensitive
information, personal accounts, and organizational systems. However, as cyber threats continue to
evolve, conventional password strategies are coming under greater scrutiny due to their
susceptibility to brute force attacks. These attacks involve systematically guessing password
combinations, with the likelihood of success largely dependent on the length and complexity of
the password. The length of a password plays a crucial role in determining the total number of
possible combinations. In addition, incorporating complexity—such as a mix of uppercase and
lowercase letters, numbers, and special symbols—greatly improves its resistance to automated
cracking attempts. This study examines how these factors influence the effectiveness of brute
force attacks to offer recommendations for creating stronger and more practical password
policies. The main aim of this study is to analyze the impact of password length and complexity
on the effectiveness of brute force attacks and provide recommendations for creating secure,
practical password policies that provide security. This includes evaluating the relationship
between password length and the time required to crack it using brute force attacks, as well as
examining how password complexity, including the use of alphanumeric characters, symbols, and
case sensitivity, affects resistance to brute force attacks. Passwords serve as a fundamental layer
of security for digital systems, yet they remain highly susceptible to exploitation. Brute force
attacks, which involve systematically guessing password combinations, have become increasingly

DOI: 10.5121/ijnsa.2025.17203 43
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
effective due to advancements in computational capabilities. A major factor contributing to this
vulnerability is users' widespread use of weak passwords, such as short, simple, or commonly
reused passwords, making accounts more susceptible to compromise. This study investigates how
password characteristics, particularly length and complexity, impact the effectiveness of brute
force attacks.

Due to the increasing information sharing, popularity of the Internet, e-commerce transactions,
and data transfer, password security has become an essential issue.

In 1979, Morris and Thompson first identified text passwords as a weakness in information
systems security. They discovered that a large percentage of weak passwords, 89%, were because
they were too short or contained only numbers or only lowercase letters and, therefore, could be
easily found in dictionaries. Since the inception of passwords, we have witnessed significant
transformations in digital identity and authentication. However, regrettably, some aspects have
remained unchanged [1].

Password security has evolved significantly over time, driven by the increasing sophistication of
cyber-attacks and technological advances. Passwords were introduced as a direct way to control
access to computer systems in the 1960s and 1970s [2]. These early passwords were short and
simple, as the computational power needed to break them was minimal. However, as technology
advanced, attackers began using brute force techniques to exploit weak passwords, revealing
vulnerabilities in these systems [3].

In the early 2000s, the rapid growth of the Internet and a rise in data breaches underscored the
urgent need for stronger password security. In response, organizations began to adopt password
policies that mandated the use of combinations of uppercase and lowercase letters, numbers, and
symbols. Additionally, they required users to update their passwords every three to six months.
[1]. Despite these policies, many users prioritized convenience over security and continued to use
very weak, easy-to-remember passwords that were also highly vulnerable to attacks [4].

Research in recent years has confirmed that short, simple passwords are insufficient against
modern cyber threats and attacks. Reports from the National Institute of Standards and
Technology NIST and Google Security have shown that passwords that are most resistant to brute
force attacks are those that contain different types of characters and are longer than 12 characters.
This shift reflects the increasing focus on creating secure and easy-to-use mechanisms, such as
password managers and multi-factor authentication, to address the limitations of traditional
password systems. These days, the main challenge is that there are still users who are reluctant to
adopt stronger password practices due to the perceived inconvenience and difficulty [5].

As years passed, researchers have explored many different ways to strengthen password security
by increasing password length and requiring password complexity. Thus, a longer and more
complex password is generally more secure, but it also faces challenges in terms of brute force
attacks.

Brute force attacks are a common technique in cybersecurity used across various fields to break
encrypted messages and passwords by systematically attempting all possible combinations until
the correct one is found [6]. This method operates under the assumption that the encryption
algorithm is known, but the key or password remains unknown [7].

Brute force attacks, which involve repeatedly attempting to guess credentials or encryption keys,
have emerged as a major concern in the realm of cybersecurity. In 2018, these attacks represented
18% of all cyber incidents managed by the security incident response team at F5 Networks.

44
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
Certain sectors have been more heavily targeted than others. For instance, within the public
sector, a staggering 50% of cyber incidents were attributed to brute force attacks, followed
closely by the financial services sector at 47. 8%, and healthcare at 41. 7%. These figures
underscore the urgent need for robust security measures across various industries to effectively
address the rise of brute force attacks [8].

In the Middle East, the threat landscape has shifted significantly with the increasing number of
Internet of Things (IoT) devices. In 2022, Kaspersky's honeypots identified and thwarted 337,474
attacks aimed at IoT devices in the region. Notably, over 113,000 of these attempted breaches
utilized brute force methods to gain access to device credentials. This highlights the critical need
for securing IoT devices through the use of strong, unique passwords and routine firmware
updates to reduce the risk of such threats[9]. To start the attack, the attacker needs to follow
several steps:

The first step is for the attacker to choose the target account, such as an email or a website
account.

The second step is to collect information. The attacker can analyse the password policies of the
target site, such as the number of characters, the requirements for symbols and numbers, and the
number of attempts to log in to the account.

The third step is to choose the tools, prepare them, and use the programs. Here, the attacker
chooses and uses programs dedicated to cracking passwords. These programs include:

* Hashcat: One of its features is that it supports more than 250 Hashing Algorithms and also
relies on GPU acceleration, which makes it faster than tools that rely on GPU.
* John the Ripper: An open source, free tool specialized in testing the strength of passwords
and cracking them. One of its notable features is the Wordlist Attack mode, which utilizes
previously leaked passwords to expedite the cracking process.
* Hydra: A very powerful tool, unlike Hashcat and John the Ripper, it targets services across
the network rather than stored hashes and tests the strength of passwords in remote login
protocols [10].

Finally, the attack is executed. When the correct password for the account is found, the attacker
can gain unauthorized access to the account and then carry out other attacks. [11].
The time required to crack passwords by brute force can be calculated and determined by the
number of possible combinations and is calculated as follows:

Total Combinations = Character Set Size^ Password Length

For Example, a password containing only 4 lowercase letters (26 characters) has 26^4 = 456.976
possible combinations. Another example of lowercase letters, a password containing only 8
lowercase letters (26 characters) has 26 ^ 8 = 208.827.064.576 possible combinations.

Here, it is clear that when using a short number of characters, the attacker does not get tired of
cracking passwords. But let us explain the difficulty when using uppercase and lowercase letters,
symbols, and numbers ( ~ 95 characters ). It has 95^8 =6.63*10^15 possible combinations, which
makes it exponentially harder to crack.

In this section, we will explore some fundamental concepts associated with passwords. A
password serves as a means of confirming a user's access to a specific system. It is typically
composed of a blend of letters, numbers, and symbols, enabling users to unlock computers,

45
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
applications, or other systems [12]. Passwords are essential in safeguarding against unauthorized
access to computers, networks, and a variety of technologies. A weak password is easy to guess
or hack. Examples of weak passwords include simple combinations such as “123456,”
“password,” birthdays, phone numbers, and personal information like names and surnames. These
passwords are highly vulnerable to attacks and can be easily compromised in a short amount of
time [13].

In contrast, a strong password is difficult to guess or hack but may also be harder to remember
due to its complexity. Strong passwords always contain a random and diverse combination of
uppercase and lowercase letters, numbers, and symbols, and they are typically at least 16
characters long. There is a direct relationship between password length and complexity - the
longer and more complex a password, the stronger it is considered. The strength of a password is
influenced by its length, specifically the number of characters it includes. Longer passwords are
more secure because they significantly increase the number of possible combinations. For
instance, a 6-character password composed solely of lowercase letters has approximately 26^6 (or
26 to the power of 6) possible combinations. In contrast, a 16-character password that
incorporates a blend of uppercase and lowercase letters, numbers, and symbols offers an
exponentially greater number of combinations. This significant increase in complexity makes it
much more resistant to attacks [14].

Various types of attacks can target passwords, rendering them susceptible to easy
compromise.One of the most prevalent forms of attack is the brute force method. In this
approach, an attacker systematically tries to guess login credentials, encryption keys, or even
concealed web pages by employing a trial-and-error strategy. The attacker systematically tests
every possible combination until the correct one is discovered. This method relies entirely on
repeated and persistent attempts to break into accounts or systems. Despite being an old
technique, it remains widely used and effective. The time it takes to crack a password varies
significantly based on its length and complexity. Weak passwords may be compromised in just a
matter of seconds, while stronger ones could take years to crack [6].

The basic concepts of password length and complexity analysis, as well as how a brute force
attack occurs, are covered. The rest of the paper is organized as follows:

Previous literature is reviewed in the second section. The third section explains the practical
aspects of password analysis and strength measurement. It combines two algorithms, Zxcvbn and
Random Forest Classifier, to achieve highly accurate results and analyzes the outcomes using the
Plotly library. We conclude the paper with the fourth and fifth sections, which discuss future
work and the conclusion, respectively.

2. RELATED WORK
The following 25 reviews examine existing research on the impact of password length and
complexity on the effectiveness of brute force attacks. It explores how these factors influence
password strength and the computational feasibility of brute force attacks.

Hamza et al. [15] sought to create a groundbreaking approach to strengthening password security
prior to their storage in databases. It presents a unique method that utilizes Braille transformation
to encrypt password hashes, adding an extra layer of protection against unauthorized access. The
findings demonstrate a notable enhancement in both password complexity and overall security.
This research underscores the critical necessity for innovative security solutions to address the
escalating sophistication of cyber threats, their approach mainly focuses on storage security,
whereas our research investigates both storage and resistance to brute-force attacks. This
46
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
highlights a gap in the literature that our study aims to address by examining the interplay
between password length, complexity, and cracking time.

Kumar and Reddy [16] introduced the RCUH model to enhance password security through
targeted generation protocols. Their study assesses cracking time but focuses more on password
creation than real-world attack scenarios. Unlike their work, our research evaluates the impact of
password length and complexity on cracking resistance across multiple hashing algorithms,
addressing gaps in practical security analysis.

Simon et al. [17] investigated the relationship between password policies and keystroke
biometrics by analyzing 40 dictionary-based passwords of different lengths. Their findings
revealed that shorter passwords without substitutions achieved an impressive 94% authentication
accuracy. However, their study is limited by its lack of comprehensive datasets, restricting the
scope of broader analysis. In contrast, our research emphasizes evaluating password strength
against brute-force attacks rather than solely focusing on authentication accuracy.

Mengli Zhang et al. [18] introduced the SPSR-FSPG model, combining PCFG and RNN to
enhance password generation by examining password structures. This innovative approach led to
a notable improvement in the coverage of actual passwords. However, the study also pointed out
certain quality concerns, including issues with duplicates and reporting delays, which could
compromise the consistency of the research findings. In contrast, our research takes a different
direction by examining how password length and complexity influence resistance to cracking
rather than focusing on password generation models.

Simone Raponi and Roberto [19] analyzed password management practices across major websites
in the EU, revealing critical weaknesses in password recovery protocols. Their study found that
28 websites face serious security threats, with over 44.12% showing vulnerabilities. The research
also highlights a gap in compliance with GDPR, as many sites have not improved their password
management despite regulatory enforcement. Unlike their focus on website security practices, our
study examines the effectiveness of password length and complexity in resisting brute-force
attacks.

Zhiyang Xia et al. [20] introduced the GENPass model, combining neural networks and PCFG to
enhance password generation. Their results show a 20% higher matching rate compared to
dataset-only approaches. However, the study highlights a limitation in current models, as they
focus on single-site testing, reducing effectiveness on unknown datasets. In contrast, our research
investigates the impact of password complexity and length on cracking resistance across various
hashing algorithms, addressing the broader applicability of password security.

Zhijie Xie et al. [21] introduced the GuessFuse framework, combining multiple passwordguessing
techniques to improve cracking performance. Experimental results indicate a notable
improvement in success rates, ranging from 4. 70% to 17. 66% with the use of five distinct guess
lists. While this study highlights a significant gap regarding effective integration strategies for
password-guessing models, our research takes a different approach. We focus on analyzing the
influence of password length and complexity on resistance to brute-force attacks across various
hashing algorithms. In doing so, we address this gap by exploring real-world attack scenarios.
Mushtaq Ali et al. [22] tackled two key issues in reformation-based password schemes: the
balance between client-side security and usability and insufficient server-side security from
storing actual passwords. Their proposed scheme improves both security and usability by
eliminating the need for manual computation or extra devices. While the scheme enhances
security on both sides, it lacks testing with a larger user base. Unlike their focus on usability and

47
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
security, our research investigates the impact of password complexity and length on resistance to
brute-force attacks, addressing a different aspect of password security.

Yuhong Mo et al. [23] used the RoBERTa algorithm to assess password complexity, achieving
high accuracy rates above 99.7% in two training sessions. However, they note a key limitation in
the model's applicability to real-world scenarios, which remains an area for future research. In
contrast, our study focuses on password length and complexity's effect on resistance to bruteforce
attacks across multiple hashing algorithms, addressing practical vulnerabilities in password
security.

Sirapat Boonkrong et al. [24] addressed password insecurity by developing an application that
measures strength using four key metrics: entropy distribution, likelihood of compromise,
effective length, and cracking time. While the app helps users understand password composition
and strength, it lacks real-world testing to assess its effectiveness against actual cyber threats.
Unlike their focus on password strength metrics, our research examines how password length and
complexity impact resistance to brute-force attacks across various hashing algorithms.

Stephen Kahara Wanjau et al. [25] developed a supervised deep learning method using a
Convolutional Neural Network (CNN) to detect SSH brute-force attacks. The model achieved
high accuracy (94.3%) and precision (92.5%), demonstrating strong performance. However, the
study points to a gap in feature selection techniques, which could further enhance the model's
effectiveness. In contrast, our research focuses on the impact of password length and complexity
on brute-force attack resistance rather than detection methods, addressing a different aspect of
password security.

Richard Shay et al. [26] investigated password-composition policies to balance security and
usability. Their findings suggest that the 3class12 and 2word16 policies are more user-friendly
and secure compared to the commonly used comp8 policy. However, the study is limited by its
focus on a small set of policies and a single dataset, which may not reflect the full range of attack
strategies. Unlike their work, our research focuses on the impact of password length and
complexity on resistance to brute-force attacks across multiple hashing algorithms.

Suyun Borjigin [27] introduced a dual-password authentication system to address credential theft
and remote attacks. By separating the login and authentication passwords, the system enhances
security against non-local login attacks. However, the study lacks a clear identification of
research gaps, making it difficult to suggest areas for future exploration. In contrast, our research
focuses on the effect of password length and complexity on resistance to brute-force attacks,
addressing practical vulnerabilities in password security.

Joshua Tan et al. [28] conducted an empirical analysis on the effectiveness of various password
policy components, such as length, character diversity, blocklists, and minimum strength
requirements. Their findings show that combining minimum length and strength criteria improves
password security. However, the study overlooks the impact of different types of blocklists on
security outcomes. In contrast, our research focuses on the effects of password length and
complexity on resistance to brute-force attacks, filling in the gap left by their study regarding
attack scenarios.

S. Cem Şahin et al. [29] aimed to define and distinguish between 'password complexity' and
'strength,' offering a framework that considers factors like an attacker's computational resources,
time, and prior knowledge. Their study highlights a gap in existing frameworks, as they often
neglect human biases and realistic attacker methods in assessing password strength. In contrast,

48
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
our research examines how password length and complexity impact resistance to brute-force
attacks, addressing a more practical perspective of password security.

S. Vaithyasubramanian et al. [30] explored the effectiveness of Markov Passwords against brute-
force attacks, using the Markov chain model to generate robust alphanumeric passwords. Their
tests on 40 randomly generated passwords revealed the time required to crack them through
brute-force methods. However, the study lacks an analysis of the long-term effectiveness of
Markov Passwords in real-world scenarios, suggesting the need for further longitudinal research.
In contrast, our research focuses on how password length and complexity impact resistance to
brute-force attacks.

Binh Le et al. [31] reevaluated the effectiveness of traditional Markov-based Password Strength
Meters (PSMs) and introduced innovative models like the Simple Markov Model (SMMl) and the
Layered Markov Model (uLMM). Their findings show that the SMMl-PSM model, incorporating
password length, is effective in identifying weak passwords. However, the study overlooks how
factors like keyboard layout and Leet transformations affect password strength, suggesting an
area for future research. Our research, on the other hand, investigates the broader impact of
password complexity and length on security when subjected to brute-force attacks.

Jianhua Song et al. [32] introduced Alphapwd, a password generation method that uses mnemonic
shapes to enhance both security and usability. Their findings show that Alphapwdgenerated
passwords are more resilient against unknown attacks compared to conventional passwords. The
study also highlights a gap in current password composition policies, emphasizing the need to
balance security and user-friendliness, as many existing strategies prioritize protection over
usability. In contrast, our research focuses on analyzing the relationship between password length,
complexity, and resistance to brute-force attacks, addressing a different aspect of password
security.

Aikaterini Kanta and Mark Scanlon [33] introduced an innovative approach to generating
customized dictionary lists based on specific topics or user interests using contextual information.
Their findings show that contextual dictionaries can increase password-cracking success rates by
up to 15.5% compared to conventional methods. The study highlights a gap in the lack of
automated techniques for extracting and using contextual information in password cracking,
suggesting that developing these methods could enhance attack effectiveness. In contrast, our
research focuses on the impact of password length and complexity on resisting brute-force
attacks, offering a different perspective on password security.

Chowdhury [34] systematically evaluated different metrics for assessing password quality,
introducing a novel complexity measure through an Entropy-Based Combinatorial Methodology.
The research found a strong correlation between password difficulty and quality, indicating that
more robust passwords are harder to breach. The study also identifies a gap in refining the
Combinatorial Entropy Algorithm to address emerging patterns and evolving cyber threats. In
contrast, our research examines how password length and complexity affect resistance to brute-
force attacks across various hashing algorithms, focusing on practical vulnerabilities.

Ibrahim Alkhwaja et al. [35] analyzed the effectiveness of various hardware configurations in
parallel brute-force and dictionary attacks, achieving significant speed improvements—1.9 times
faster for brute-force cracking using six cores and 4.4 times more efficient dictionary attacks with
eight-core processing. The study highlights a limitation in current passwordcracking techniques,
which struggle to adapt to the increasing complexity of password policies, such as longer lengths
and more diverse character sets. Unlike their focus on cracking methods, our research investigates
the role of password length and complexity in strengthening security against brute-force attacks.

49
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
Katha Chanda [36] explored the factors that enhance password strength and the challenges in
cracking them. The study introduced PwdStrength, a password strength checker that classifies
passwords as 'weak,' 'fair,' 'strong,' or 'invalid,' while updating its database to include commonly
used passwords to defend against brute-force attacks. The research highlights a gap in exploring
alternative authentication methods beyond traditional passwords, which could improve usability
and address user hesitance. In contrast, my research uses Random Forest to classify passwords as
strong, medium, or weak based on their characteristics, enhancing password security evaluation.

Javier Galbally et al. [37] introduced an advanced multimodal technique for measuring password
strength, tested through a comprehensive experimental framework. Their unified methodology
integrates multiple techniques for a more thorough password strength evaluation. The study’s
findings come from two experiments assessing this new approach's efficacy. However, the
research highlights the need for further evaluations across a broader range of password strength
indicators to strengthen the results. In contrast, my research uses Random Forest combined with
Zxcvbn to classify passwords, offering a more detailed evaluation of password security.

Seok Jun and Byung Lee [38] introduced innovative ChatGPT-based metrics for assessing
password security strength. Their method uses these prompt metrics to flexibly and adaptively
evaluate password strength without the need for additional model training. The study highlights a
strong correlation between the LUDS metric and the Complexity score, with a Pearson correlation
coefficient of 0.7281. However, the research points out a limitation in the relatively weak
correlation (0.4717) between the Zxcvbn metric and memorability, indicating difficulties in
assessing how memorable passwords are. In contrast, my research combines Random Forest with
Zxcvbn to classify passwords, providing a more comprehensive evaluation of password strength
and security.

Tanvi Gautam [39] explored various password-cracking methods, focusing on brute-force attacks,
dictionary attacks, and rainbow table attacks. The research emphasizes the importance of strong
password policies in mitigating vulnerabilities associated with these techniques. However, a gap
exists in understanding the psychological factors influencing users' password choices. Addressing
this could help explain why certain passwords are more vulnerable to compromise than others. In
contrast, our research investigates the role of password length and complexity in strengthening
security against brute-force attacks.

50
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
Table 1. Summary of Key Findings from Previous Studies

3. METHODOLOGY

This section will provide a thorough overview of the proposed model and the tools utilized in its
development.

In this research, we used an experimental methodology to examine how password length and
complexity affect the effectiveness of brute force attacks. This involved running experiments on
30 different passwords and measuring the expected time to crack each one. Passwords are
encrypted using four distinct algorithms: MD5, SHA-256, Bcrypt, and Argon2. The main
objective of this study is to analyse the strength and complexity of a password for brute force
attacks based on its unique characteristics and the time taken to crack that password. To simulate
brute force attacks and evaluate the effectiveness of different types of passwords, we will use
programming tools such as Python, along with libraries such as hashlib and Plotly. Random
Forest Classifier and Zxcvbn were also used. Random Forest Classifier was used to measure the
length of the word and classify it (weak, medium, strong, very strong). The goal of using it with
the Zxcvbn algorithm was to increase the accuracy of password analysis and evaluation, as the
Zxcvbn algorithm evaluates the password from 0 to 4. Passwords were not measured based on
encryption algorithms but rather were evaluated based on their length and complexity. However,
the hashing algorithm for each password was saved in an Excel file. Each hashing algorithm has
its properties; for example, MD5 is regarded as outdated and insecure due to its numerous
vulnerabilities and its reliance on a 128-bit (16-byte) hash value. While it has traditionally been
used to verify the integrity of data against alterations and to check file integrity, it is no longer
recommended for applications that demand high security. The SHA-256 algorithm is part of the
SHA family of cryptographic hash functions, and it produces a hash value that is 256 bits long,

51
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
equivalent to 32 bytes. It offers enhanced security compared to MD5 and is commonly utilized in
various applications, including cryptocurrencies like Bitcoin, data integrity verification, and
digital signatures. With its resilience against collision attacks, SHA256 is a far more secure
choice than MD5 [40]. Also, Bcrypt was used. This algorithm is specifically designed to store
passwords securely. When compared to earlier algorithms, it stands out as the most secure option
available, largely due to its use of a technique known as salting. Salting involves adding a random
value to the password before it undergoes the hashing process. This approach considerably
increases the difficulty for attackers attempting to carry out brute force attacks [41]. Finally, the
Argon2 algorithm, which is a prominent key derivation.

Function that emerged as the champion of the Password Hashing Competition in July 2015. This
innovative creation was designed by Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich, who
are affiliated with the University of Luxembourg. Argon2 employs the BLAKE2 hash algorithm
to effectively and securely scramble the input data, which includes both the password and the salt
[42].

3.1.Flowchart

Figure 1 presents the flowchart, which can be summarized in the following steps:

1. Collect common and random passwords users are used to using to protect their accounts.
2. Use 4 hashing algorithms to encrypt passwords and Zxcvbn algorithm and Random Forest
Classifier to evaluate passwords.
3. Simulate the attack by measuring the time it takes to crack each password.
4. Analyze passwords using Plotly in a graph.
5. Store passwords and all results in an Excel file.

Figure 1. Flowchart

52
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
3.1.1. Dataset Collection

The dataset used in the research consisted of 30 passwords selected randomly, with various
lengths and complexities tested, incorporating symbols, uppercase and lowercase letters, and
numbers. Some of the passwords were commonly used ones taken from leaked password datasets,
while others were randomly selected. These passwords were chosen to represent reallife
scenarios, as many users are unaware of the importance of password complexity and length.

3.1.2. Feature Selection

We use 4 hashing algorithms to store and keep the information secure, and encryption was
applied to each password after evaluating its strength.

Zxcvbn and Random Forest Classifier have been combined to accurately evaluate passwords as
an algorithm in that zxcvbn is a password strength estimator developed with insights from
password cracking techniques. It identifies and evaluates more than 40,000 frequently used
passwords through pattern recognition and conservative estimations. The tool effectively filters
out common first and last names, well-known words from Wikipedia, and other widely used
terms across various cultures. Additionally, it detects typical patterns such as dates, repeated
sequences (like '1111'), repetitive strings (such as 'abcabc'), and random keyboard combinations
(like 'qwertyuiop') [43].

The Random Forest Classifier is a versatile and easy-to-use machine-learning algorithm that often
delivers impressive results, even without extensive hyperparameter tuning. Its adaptability and
flexibility contribute to its status as one of the most widely used algorithms, making it wellsuited
for both classification and regression tasks. It measured the length of the password and classified
the password into four classes (weak, medium, strong, and very strong) [44].

3.1.3. Evaluation

The attack was simulated, and each password was evaluated using the combination of Zxcvbn and
Random Forest Classifier algorithms. The time taken to crack the password was also simulated
using two types of attacks: offline and online.

3.1.4. Analyzation

Every 30 passwords were analyzed through a graph using the Plotly library, and the time to crack
the password was evaluated. Also, the score is recorded for each password from 0 to 4 to be clear
and easy to understand.

3.1.5. Save Data

Every 30 passwords are stored in an Excel file showing all aspects of the evaluation including
password, length, rating, score (0-4), warning that appears if the password is less than 4,
suggestion to improve each password to become stronger, time taken to crack the password and
four hashing algorithms.

3.2. Results and Discussion

In this section of the research, we will examine the results by evaluating 30 passwords based on
their length, strength, and the time taken to crack them. The duration required to crack a single

53
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
password was analysed across four methods: online slow, online fast, offline slow, and offline
fast.

Online attacks pose a prevalent threat, capable of targeting web applications, exposed SSH
terminals, and virtually any login interface. However, these attacks face two important
limitations.

First, their effectiveness is limited by network speed. Second, online password attacks often
create significant noise; numerous failed attempts to enter the wrong password can activate
security protocols. For instance, after a set number of unsuccessful tries, the targeted account
might be locked, or the attacker's IP address may be blocked, preventing any further access.

Offline attacks: This type of attack occurs when an attacker gains access to a database containing
encrypted passwords (hashes) and attempts to decrypt them without interacting with the target
system. The process takes place on the attacker's own machine, allowing for an unlimited number
of attempts. This method is, therefore, much faster than online attacks and benefits from the fact
that there is no limit on the number of attempts [45].

Regarding the speed of different types of attacks:

• Very fast: In online attacks, thousands of attempts can be made per second, while in offline
attacks, millions of guesses can be attempted per second.
• Slow: In online attacks, only a few attempts can be made at long intervals, whereas in
offline attacks, a few hundred to thousands of guesses per second are possible.

Figure 2. 3 weak passwords results

In Figure 2, the password "abc," consisting of just three characters, has been categorized as weak.
This classification is due to its commonality and the absence of uppercase letters, symbols, or
numbers. The zxcvbn algorithm assigned a score of 0 to this password, signifying it as extremely
weak. Furthermore, the algorithm issued a warning related to this score and recommended ways
to enhance the password's strength.

In terms of security, the time required to crack this password was found to be remarkably short—
less than 10 minutes. This highlights the significant vulnerability of simple, threecharacter
passwords to brute-force attacks.

54
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
The passwords "123L" and "12345L! " illustrate how minor modifications can impact security.
The first password simply added an uppercase letter, while the second included a symbol,
resulting in a slight score increase of just one point. Despite this small improvement, both
passwords were still deemed weak. Interestingly, the password "12345L! " took longer to crack
due to its marginally higher complexity, emphasizing the importance of diversity in password
composition.

These findings suggest that while incorporating elements like uppercase letters or symbols can
provide a slight enhancement in security, they are inadequate against more sophisticated attacks.
This highlights the critical need for a varied combination of characters to truly bolster password
strength.

Figure 3. 3 passwords results

In Figure 3, we see that the password "LAMALAMA2025@", which consists of 13 characters


and includes uppercase letters, numbers, and the @ symbol, has been categorized as strong.
However, the zxcvbn algorithm rated it with a score of 3. This rating implies that while the
password is relatively secure, it still needs adjustments to reach a score of 4, which would be
classified as very strong. The algorithm takes into account factors beyond mere length and
character variety, such as identifiable patterns or repetitions that could be exploited in a potential
attack.

Notably, despite the password's complex makeup, the time required to crack it through a rapid
offline attack was surprisingly brief—taking less than a second to breach successfully. This
underscores an important concern: even a password that appears to be robust may still possess
predictable patterns or vulnerabilities, rendering it susceptible to efficient cracking methods such
as precomputed hash attacks or dictionary-based approaches.

The password "lAmA44@", which has 7 characters, has been deemed weak despite its
combination of uppercase and lowercase letters, numbers, and a special character. This highlights
the importance of length in determining password strength—passwords with only 7 characters,
regardless of their variety, remain vulnerable to rapid brute-force attacks.

Similarly, the password "LAa1234," also composed of 7 characters, received a weak rating of 1.
This low score is primarily due to its status as a commonly used password, its lack of sufficient

55
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
complexity, and its relatively short length. Consequently, this emphasizes the need to steer clear
of typical password patterns and to prioritize both length and complexity to improve security.

Figure 4. 3 Strong passwords results

Figure 4 displays three passwords, each composed of either 17 or 21 characters, which were
classified as very strong, achieving a score of 4. Their impressive strength can be attributed to a
combination of length, character diversity, and complexity, making them highly resistant to
attacks. Estimates suggest that cracking these passwords would take years or even centuries,
underscoring their robustness against contemporary brute-force and dictionary attack methods.
However, it is crucial to remember that while the passwords’ length and complexity provide
substantial security, the estimated time to crack them also hinges on factors such as the attacker’s
computational power and the employment of advanced techniques, like parallel processing or
GPU-based cracking. This underscores the importance of continuously reassessing password
security in light of evolving computational capabilities.

To enhance the understanding of the time needed to crack each password, we created a graph
using the Plotly library. This visual representation highlights the estimated cracking times for
various passwords, clearly demonstrating the significant disparity in security between long,
complex passwords and their shorter, simpler counterparts.

Figure 5. Passwords Strength vs. Brute Force Attack Time

56
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
The time scale at the bottom of the chart utilizes a logarithmic scale in Figure 5, which means that
each increment reflects an exponential increase instead of a linear one. This format effectively
illustrates a vast range of time values, making the information more accessible. The numbers
indicate the estimated duration to crack passwords through a rapid offline brute-force attack.

The offline Fast Attack type was analysed because it is the fastest, and the time taken to crack
each password was evaluated as follows, and the results are shown in Figure 6:

1n: means that the password can be cracked in a billionth of a second, and the password, in this
case, is considered very weak.
1µ: is at the same level as a nanosecond, and a password that can be cracked in a millionth of a
second is considered weak.
0.001: The password here can be cracked in a thousandth of a second, and here the password is
considered easy and can be hacked easily.
1: The attack can successfully crack the password within one second.
1000: The password can be cracked in approximately 17 minutes.
1M: Here, the attacker will take 11 days to crack the password.
1B: Here the password is considered strong because the attacker will take about 32 years to crack
it and the password here is classified as very strong.

Figure 6. Passwords Strength (Score )

The strength of thirty passwords is presented in Figure 6, offering a clear visual representation of
each password's rating. These ratings, which range from 0 to 4, indicate different levels of
security: a rating of 0 signifies very weak passwords, while a rating of 4 denotes very strong ones.
This grid effectively allows for quick comparison of the passwords, emphasizing how factors
such as length, complexity, and character diversity contribute to improved security.

57
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025

Figure 7. The Excel File

Figure 8. The Excel File

Finally, an Excel file (Figure 7,8) was created for each password, containing its length,
classification, score, warnings, suggestions, and estimated attack times for both online (fast and
slow) and offline (fast and slow) attacks. In addition, each password was saved with its hash
using four algorithms: MD5, SHA-256, Bcrypt, and Argon2 - not for evaluating password
strength or complexity, but solely for storage purposes. The classifications were color-coded: red
for weak, yellow for medium, light green for strong, and dark green for very strong. From the
evaluation and analysis, we conclude that symbols, uppercase and lowercase letters, and numbers
are crucial for password security. Passwords consisting of 18 characters, including a mix of
numbers, letters, and symbols, were classified as very strong and estimated to take approximately
32 years to crack. It is equally important to refrain from reusing passwords across different
systems or websites.

Our study is compared with the study by Kumar and Reddy (2020), “An efficient security model
for password generation and time complexity analysis for password cracking.” Both studies
emphasize the importance of password length and complexity. Our approach differs in several
key aspects.

In experimental validation, the previous study focused on the Random Character Usage (RCUH)
model for password generation. Our study tested real-world passwords against multiple hashing
algorithms and simulated brute force attacks under different conditions (online/offline, fast/slow).

58
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
Regarding the diversity of algorithms, Kumar and Reddy (2020) evaluated passwords based on
entropy calculations. Our study included Zxcvbn and Random Forest Classifier, which provide a
more practical assessment of password complexity and security.

The previous study proposed a new approach for password generation but did not compare the
results extensively with brute force resistance metrics. However, our study provides a clear
comparison of how different password structures withstand real-world attacks and provides
actionable security recommendations and suggestions.

While both studies emphasize the importance of password complexity, our research takes a step
further by incorporating practical implementation, testing, and simulation to offer a real-world
perspective on password security. Our findings not only support previous research highlighting
the significance of entropy but also reveal how factors such as password length and diversity play
a crucial role in enhancing resistance to brute force attack

4. FUTURE WORK
While this study tested 30 passwords, this sample size may not fully capture the diversity of
password choices in real-world scenarios. Future research could expand the dataset to include a
significantly larger and more representative sample of passwords from various sources, including
those commonly used in different domains such as social media, banking, and enterprise
environments.

In addition, the passwords analyzed in this study were exclusively in English. Future studies
could extend the analysis to include passwords in multiple languages, considering linguistic and
cultural variations in password creation. Some languages may use different character sets,
diacritics, or unique patterns that could impact password strength and vulnerability to attacks.

Furthermore, future research could explore more sophisticated attack methodologies. While this
study primarily focused on brute force and dictionary attacks, future work may simulate hybrid
attacks, which combine multiple attack techniques and AI-based guessing methods. Specifically,
machine learning models such as Transformer-based architectures (e.g., GPT) or recurrent neural
networks (RNNs) could be trained on large datasets of breached passwords to predict and crack
passwords more efficiently. Evaluating how AI-driven attacks compare to traditional methods
could provide deeper insights into emerging security threats.

An essential direction for future efforts is the incorporation of multi-factor authentication (MFA)
as an extra layer of security. While password strength is crucial, MFA can significantly reduce the
risk of unauthorized access even if a password is compromised. Future research could explore
how different MFA mechanisms, such as biometric authentication (e.g., fingerprint recognition,
facial recognition), hardware tokens, and time-based one-time passwords (TOTP), impact overall
security when combined with strong password policies. Additionally, alternative authentication
methods such as passkeys, public key cryptography, and decentralized identity verification could
be evaluated as potential replacements for traditional password-based authentication.

Finally, future studies could investigate user behavior and password management practices,
including how individuals create, store, and reuse passwords. Understanding these behaviors
could help in designing more effective password policies and security awareness programs to
encourage users to adopt stronger authentication methods. Moreover, behavioral biometrics (e.g.,
typing patterns and mouse dynamics) could be explored as an additional security layer that
continuously verifies user identity beyond the initial login phase.

59
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025

5. CONCLUSION
In this study, we investigated how the length and complexity of passwords affect their resistance
to brute force attacks. The findings indicate that longer passwords greatly enhance the number of
potential combinations, thereby strengthening security. Each additional character significantly
increases the difficulty faced by attackers trying to guess passwords using brute force techniques.
However, it is important to note that simply increasing password complexity does not result in a
proportional increase in security. Complex passwords, especially shorter ones, can still be
vulnerable to advanced brute force tools, which can rapidly test a vast number of combinations.
Thus, prioritizing password length over complexity may provide more effective protection against
such attacks.

Organizations should implement security policies that emphasize password length as a primary
defense mechanism while also promoting multi-factor authentication (MFA) to mitigate risks
associated with compromised credentials. Additionally, adopting alternative authentication
methods, such as passkeys and biometric verification, can further enhance security and reduce
reliance on traditional passwords. Regular security awareness training and enforcement of
password best practices can help users create and manage stronger authentication credentials.

REFERENCES

[1] Morris, R., & Thompson, K. (1979). Password Security: A Case History. Communications of the
ACM, 22(11), 594-597.
[2] The history and future of passwords. (2025, February 12). Beyond Identity
[3] Bellovin, S. M., & Merritt, M. (1992). Encrypted Key Exchange: Password-Based Protocols
Secure Against Dictionary Attacks. Proceedings of the IEEE Computer Society Symposium on
Research in Security and Privacy, 72-84.
[4] Florêncio, D., & Herley, C. (2007). A Large-Scale Study of Web Password Habits. Proceedings of
the 16th International Conference on World Wide Web, 657-666.
[5] NIST special publication 800-63B. (n.d.).
[6] Brute force attack: Definition and examples. (2023, June 30).
[7] Popular tools for brute-force attacks [updated for 2020]. (n.d.). Cybersecurity Training &
Certifications | Infosec.
[8] Zamel, S. H. (2019, July 18). Europe, Middle East and Africa a hotspot for brute force attacks.
Saudi Shopper
[9] Kaspersky blocks over 330,000 attacks on IoT devices in the Middle East in 2022. (2023, March
28). Eye of Riyadh
[10] Hydra | Kali Linux tools. (n.d.). Kali Linux.
[11] What is a brute force attack? | Definition, types & how it works. (n.d.). Fortinet.
[12] Definition of password. (n.d.). PCMAG.
[13] Weak password. (n.d.). Acunetix.
[14] How long should my password be? (n.d.). Bitwarden.
[15] Touil, H., Akkad, N. E., Satori, K., Soliman, N. F., & El-Shafai, W. (2024). Efficient braille
transformation for secure password hashing. IEEE Access, 12, 5212-5221.
[16] Kumar, B. P., & Reddy, E. S. (2020). An efficient security model for password generation and time
complexity analysis for cracking the password. International Journal of Safety and Security
Engineering, 10(5), 713-720.
[17] Parkinson, S., Khan, S., Crampton, A., Xu, Q., Xie, W., Liu, N., & Dakin, K. (2021). Password
policy characteristics and keystroke biometric authentication. IET Biometrics, 10(2), 163-178.
[18] Zhang, M., Zhou, G., Khurram Khan, M., Kumari, S., Hu, X., & Liu, W. (2019). SPSR-FSPG: A
fast simulative password set generation algorithm. IEEE Access, 7, 155107-155119.
[19] Raponi, S., & Pietro, R. D. (2020). A longitudinal study on web-sites password management
(in)Security: Evidence and remedies. IEEE Access, 8, 52075-52090.
[20] Xia, Z., Yi, P., Liu, Y., Jiang, B., Wang, W., & Zhu, T. (2020). GENPass: A multi-source deep
learning model for password guessing. IEEE Transactions on Multimedia, 22(5), 1323-1332.
60
International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.2, March 2025
[21] Xie, Z., Shi, F., Zhang, M., Ma, H., Wang, H., Li, Z., & Zhang, Y. (2024). GuessFuse: Hybrid
password guessing with multi-view. IEEE Transactions on Information Forensics and Security,
19, 4215-4230.
[22] Ali, M., Baloch, A., Waheed, A., Zareei, M., Manzoor, R., Sajid, H., & Alanazi, F. (2021). A
simple and secure Reformation-based password scheme. IEEE Access, 9, 11655-11674.
[23] Yuhong Mo, Shaojie Li, Yushan Dong, Ziyi Zhu, & Zhenglin Li. (2024). Password Complexity
Prediction Based on RoBERTa Algorithm.
[24] Sirapat Boonkrong, Arkalerk Kitthimon, Patchara Koksoungnoen, & Krissada Jenprakhon. (2021).
Password Strength Meter Application.
[25] Wanjau, S. K., Wambugu, G. M., & Kamau, G. N. (2021). SSH-brute force attack detection model
based on deep learning. International Journal of Computer Applications Technology and Research,
10(01), 42-50.
[26] Shay, R., Komanduri, S., Durity, A. L., Huh, P. (., Mazurek, M. L., Segreti, S. M., Ur, B., Bauer, L.,
Christin, N., & Cranor, L. F. (2016). Designing password policies for strength and usability. ACM
Transactions on Information and System Security, 18(4), 1-34.
[27] Suyun Borjigin. (2021). A Dual-Password Login-Authentication Mechanism.
[28] Tan, J., Bauer, L., Christin, N., & Cranor, L. F. (2020). Practical recommendations for stronger,
more usable passwords combining minimum-strength, minimum-length, and Blocklist
requirements. Proceedings of the 2020 ACM SIGSAC Conference on Computer and
Communications Security.
[29] S. Cem, Ahin, Robert Lychev, & Neal Wagner. (2024). General Framework for Evaluating
Password Complexity and Strength.
[30] Vaithyasubramanian, S., Christy, A., & Saravanan, D. (2014). An analysis of Markov password
against brute force attack for effective web applications. Applied Mathematical Sciences, 8,
5823-5830.
[31] Thai, B. L., & Tanaka, H. (2024). A study on Markov-based password strength meters. IEEE
Access, 12, 69066-69075.
[32] Song, J., Wang, D., Yun, Z., & Han, X. (2019). Alphapwd: A password generation strategy based
on mnemonic shape. IEEE Access, 7, 119052-119059.
[33] Kanta, A., Coisel, I., & Scanlon, M. (2022). A novel dictionary generation methodology for
contextual-based password cracking. IEEE Access, 10, 59178-59188.
[34] Chowdhury. (2024). Analyzing Password Strength: A Combinatorial Entropy Approach.
[35] Lkhwaja, I., Albugami, M., Alkhwaja, A., Alghamdi, M., Abahussain, H., Alfawaz, F., Almurayh,
A., & Min-Allah, N. (2023). Password cracking with brute force algorithm and dictionary attack
using parallel programming. Applied Sciences, 13(10), 5979.
[36] Chanda, K. (2016). Password security: An analysis of password strengths and vulnerabilities.
International Journal of Computer Network and Information Security, 8(7), 23-30.
[37] Galbally, J., Coisel, I., & Sanchez, I. (2017). A new multimodal approach for password strength
estimation—Part II: Experimental evaluation. IEEE Transactions on Information Forensics and
Security, 12(12), 2845-2860. [33]
[38] Lee, B. M. (n.d.). A novel approach to password strength evaluation using chatgpt-based prompt
metrics_supp1-3503653.pdf.
[39] Tanvi Gautam. (2024). Investigation of Password Cracking Methodologies.
[40] Jena, B. K. (2021, July 13). What is SHA-256 algorithm: How it works and applications |
Simplilearn. Simplilearn.com.
[41] BCrypt algorithm. (n.d.). Topcoder.
[42] Overview of Argon2: A memory hard function for password hashing. (n.d.). Gist.
[43] Introduction | zxcvbn-TS. (n.d.). GitHub Pages.
[44] Random forest: A complete guide for machine learning. (2021, July 22). Built In.
[45] Miller, M. (2021, March 22). What's the difference between offline and online password attacks?
TriaxiomSecurity.

61

You might also like