Proceedings ArticleDOI
Rainbow table to crack password using MD5 hashing algorithm
Himanshu Kumar,Sudhanshu Kumar,Remya Joseph,Dhananjay Kumar,Sunil Kumar Singh,Ajay Kumar,Praveen Kumar +6 more
- pp 433-439
TLDR
This paper presents the implementation of Rainbow tables for cracking passwords of operating systems such as Windows7 and application which uses Message Digest v5(MD5) and Simple Hash Algorithmv1(SHA1) as their password hashing mechanism.Abstract:
Rainbow tables are basically huge tables filled with hash values and are used to find required password. Rainbow Table is used by the hackers to find the password by reversing the hashing function. Hashing the plaintext or password is a 1-way function which implies that hash can't be decrypted to find the required password[10]. To authenticate the user a system takes the hash value generated by the hash function on user's computer and it is compared with the hash value stored in the table on the server machine. If the hash matches, then the user is authenticated and can access the system. Rainbow tables are used to crack the password in short amount of time as compared to brute force technique, but it takes a lot of storage to hold rainbow table itself[1]. It is the most efficient methods for cracking passwords. This paper presents the implementation of Rainbow tables for cracking passwords of operating systems such as Windows7 and application which uses Message Digest v5(MD5) and Simple Hash Algorithmv1(SHA1) as their password hashing mechanism. It discusses the functionality of Rainbow Tables and its advantages over conventional brute-force approach and the usage of rainbow table to crack windows password.read more
Citations
More filters
Journal ArticleDOI
Privacy Protection for Internet of Drones: A Network Coding Approach
Yu-Jia Chen,Li-Chun Wang +1 more
TL;DR: This paper proposes an enhanced secure pseudonym scheme to protect the privacy of cloud data in Internet of Drones and implements the proposed two-tier light-weight network coding mechanism when facing untrusted cloud database.
Proceedings ArticleDOI
Securing passwords from dictionary attack with character-tree
TL;DR: This paper proposes a novel method for ensuring security for passwords against dictionary attacks, checks strength of the user passwords using a dictionary which is stored as a character tree and helps to create strong password hashes that are resistant to dictionary attacks.
Journal ArticleDOI
Superword: A honeyword system for achieving higher security goals
TL;DR: This study proposes a “matching attack” model and finds that although Erguler's honeyword system can achieve perfect flatness, the success rate of the attacker is 100% under matching attack, and proposes a new honeyword approach named Superword that isolates the direct relationship between username and the corresponding hashed password in password files.
Journal ArticleDOI
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets
TL;DR: A model that is capable of representing user behavior patterns in a wide range of user activities captured from various data sources is proposed and a method for creating unique one-time challenges based on the model is demonstrated.
Dissertation
Modelling of a privacy language and efficient policy-based de-identification
TL;DR: Within this framework privacy policies are expressed in the proposed Layered Privacy Language (LPL) which allows to specify legal privacy policies and privacy-preserving de-identification methods and the privacy requirements of each individual privacy policy are enforced filling the gap between legal Privacy policies and their technical enforcement.
References
More filters
Journal ArticleDOI
A cryptanalytic time-memory trade-off
TL;DR: A probabilistic method is presented which cryptanalyzes any N key cryptosystem in N 2/3 operational with N2/3 words of memory after a precomputation which requires N operations, and works in a chosen plaintext attack and can also be used in a ciphertext-only attack.
Book
Practical Cryptography
Niels Ferguson,Bruce Schneier +1 more
TL;DR: The Practical Cryptography as mentioned in this paper provides a hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications, which can be used to implement cryptography and how to incorporate it into real world systems.