scispace - formally typeset
Search or ask a question

Showing papers on "Rainbow table published in 1989"


Patent
17 Aug 1989
TL;DR: A key table from a single key such that the relationship between the keys in the key table cannot be determined even if the system implementation is known as discussed by the authors, is a cryptographic system that uses variable functions in which the determinants are changed by the variable function chosen by the determinant.
Abstract: A cryptographic system creates a key table from a single key such that the relationship between the keys in the key table cannot be determined even if the system implementation is known. The system uses variable functions in which the determinants are changed by the variable function chosen by the determinant. Thus, the functions used in creating the key table do not have to be one-to-one functions. From the key table, four blocks of bytes of additional key based determinants are formed which are called masks. The original key does not exist in either the key table or the mask table. The system preferably uses the key table in a multiple round encryption process. The keys chosen from the table for a key addition operation are a function of the plaintext, the current state of the ciphertext, and the mask values. Therefore, the order in which the keys are chosen is not predetermined or patterned. The system also selects the other encryption functions, including permutations and substitutions, by the plaintext, current state of the ciphertext and the mask values. The cryptographic system also can include a function referred to as the enclave function. This function operates on lookup tables and creates complete inter-symbol dependency on the block of bytes.

108 citations


Proceedings ArticleDOI
06 Feb 1989
TL;DR: A password authentication mechanism based on the public-key distribution cryptosystem is proposed, which uses an authentication table to replace the traditional password file.
Abstract: A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authentication table is comprised, the system security is preserved. The user's password is effectively bound to the user's identification in a timely, efficient, and simple manner. >

3 citations