Brute force attacks use complex software to flood the system with all potential passwords or keys to find the right value. In theory, such attacks could be used to guess passwords and keys and access encrypted data. The theoretical time required for a successful brute force attack is used as an important indicator of the strength of the cryptosystem. The resources required for a successful brute force attack on a secure system are important. The time required to guess a password increases exponentially (rather than linearly) as the password length increases. Therefore, the bit size of the encryption key is gradually increasing from the initial standard of 56 bits to the current standard of 128 or 256 bits. Decrypting a 256-bit key requires a lot of computing power. Therefore, brute force attacks are usually only possible on supercomputers.