scispace - formally typeset
Search or ask a question

Showing papers on "Rainbow table published in 2007"


Patent
23 Mar 2007
TL;DR: In this article, the authors present a hash process for use in password authentication, which is consistent with the invention of the hash process and provides a hash value based on the combined password data and salt value.
Abstract: Methods and systems consistent with the invention provide a hash process for use in password authentication. For instance, in one embodiment, a method may include receiving password data and combining the password data with a salt value. The salt value may, for example, be a random number. The method may also include calculating a first hash value based on the combined password data and salt value. The method may further include calculating, in a second iteration, a second hash value based on the first hash value and the password. In exemplary implementations, the method may also iteratively calculate a new hash value by applying the output hash value of a previous iteration, in combination with the password data, to the hash function. The number of iterations may be determined by an iteration count.

53 citations


Journal ArticleDOI
TL;DR: This paper proposes a protocol that allows a client to securely use a single password across multiple servers, and also prevents phishing attacks, and is an anti-phishing password protocol that is simple, secure, efficient and user-friendly.

42 citations


Patent
Xuemin (Sherman) Chen1
12 Oct 2007
TL;DR: Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device as discussed by the authors, the password may be unique per chip location, per challenge and/or per chip.
Abstract: Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per challenge and/or per chip. The location of the chip may be determined based on GPS information and securely stored and securely communicated to an external entity. Two or more of the chip location, a generated random number sample and a key from a table of keys may be passed to a hash function that may generate a password. An external entity attempting access may be challenged to respond with a password that matches the password generated by the hash function. The response may be compared with the password generated by the hash function and access to one or more secure functions may be granted based on the comparison.

39 citations


Patent
Fong Pong1
12 Jul 2007
TL;DR: In this paper, a method and system for hash table based routing via table and prefix aggregation are provided. But, it is not clear how to combine prefix aggregation into a single hash table, where each hash table comprises one or more encoded bits to uniquely identify said prefixes.
Abstract: Aspects of a method and system for hash table based routing via table and prefix aggregation are provided. Aspects of the invention may enable aggregating prefixes of varying lengths into a single hash table, wherein each entry in the hash table comprises one or more encoded bits to uniquely identify said prefixes. Additionally, an entry in a hash table may be formatted based on a length of one or more representations of said prefixes in the entry. Aggregating prefixes into a hash table may comprise truncating the prefixes to a common length. In this regard, the encoded bits may indicate the length of the prefixes prior to and/or subsequent to truncation. Additionally, the encoded bits may represent bits removed from the prefix during truncation. In this regard, an encoded bit may represent a possible combination of removed bits and may be asserted when the removed bits are equal to that combination.

22 citations


Book ChapterDOI
11 Apr 2007
TL;DR: Based on the experimental results, it is confirmed that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vault can perform the fingerprint verification securely even with one thousand chaff data included.
Abstract: Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks This is also true for new authentication architectures known as crypto-biometricsystems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vaultcan perform the fingerprint verification securely even with one thousand chaff data included

19 citations


Patent
30 Jul 2007
TL;DR: In this article, a method of auto updating a password comprises opening a password file and a new password file, reading information from the password file including user ID type, and then applying the user identity type to a predetermined application type.
Abstract: A method of auto updating a password comprises opening a password file and a new password file and reading information from the password file including user ID type. The method applies the user ID type to a predetermined application type and executes password-updating logic to generate a new password for the application type. The method further updates the new password file with the new password for the predetermined application type. A system comprises at least one of a hardware component and a software component configured to read information from a password file including user ID type. The hardware component and/or software component is further configured to determine that the user ID type matches to an application type and to apply the user ID type to the matched application type. The hardware component and/or software component is further configured to generate a new password for the application type and to update the password file with the new password for the application type.

11 citations


Patent
13 Jun 2007
TL;DR: In this article, an apparatus and method for dynamically changing a password are provided, in which a random number is generated, and an original password and an operator are checked, by performing an operation of the random number and the original password based on the operator.
Abstract: An apparatus and method for dynamically changing a password are provided. In the method, a random number is generated, and an original password and an operator are checked. The original password is changed by performing an operation of the random number and the original password based on the operator. Accordingly, the password exposure can be prevented and the personal information and asset information can be protected without using additional devices.

11 citations


Patent
Rolf Repasi, Simon Clausen1
24 Sep 2007
TL;DR: In this article, a method/system/program for allowing user input of a password is described, which includes the steps of, in a processing system, presenting password elements to a user, allowing a user to select certain password elements and submitting the password.
Abstract: A method/system/program for allowing user input of a password. The method includes the steps of, in a processing system, presenting password elements to a user, allowing a user to select certain password elements and submitting the password. Checking can be performed to see if a password criteria has been satisfied prior to submission. The password can also be converted to a binary format, after which processing of the converted password can occur. The password elements are represented by objects that are non-alphanumeric characters, for example various values or aspects, such as shapes, characters, styles, filling or shading, and/or colouring.

10 citations


Patent
Yasuhiro Mizukoshi1
22 Jun 2007
TL;DR: In this paper, a sound communication terminal performs a process using a hash function once on a one-time password transmitted this time, and performs authentication by determining whether the processed onetime password matches a one time password obtained last time or not.
Abstract: The present invention is directed to perform high-reliable authentication using a one-way function that a communication is a communication which was performed with the same apparatus to be authenticated by storing a password only in an apparatus to be authenticated (it is unnecessary to store a password in both of an authentication apparatus and an apparatus to be authenticated) without transmitting a challenge code. When a setting is updated in a setting management server, authentication is performed by using a one-time password obtained last time. A sound communication terminal performs a process using a hash function once on a one-time password transmitted this time, and performs authentication by determining whether the processed one-time password matches a one-time password obtained last time or not. Whether the information at the time of the change in the setting is proper or not is determined by a sound terminal.

3 citations


Patent
18 May 2007
TL;DR: In this article, the authors describe a method for changing a user's password. In one embodiment, the method includes determining at least one password equivalent value, determining a safe-to-transmit password value and determining a password change authentication value.
Abstract: Systems and methods for changing a user password are described. In one embodiment, the method includes determining at least one password equivalent value, determining a safe-to-transmit password value, determining a password change authentication value, transmitting, from a remote device to a controller, the password change authentication value and the safe-to-transmit password value, confirming the data integrity of the password change authentication value sent from the remote device to the controller, and storing a new password equivalent value.

1 citations


Patent
10 Jan 2007
TL;DR: In this paper, a password remotely authentication method based on the intelligent card was proposed, where the server generates encrypted user information by using the system key and user identifier inputted as the first hash function value and the user password inputting as the second hash function converse function value.
Abstract: A password remotely authentication method based on the intelligent card, and the intelligent card, the server and the system thereof, and a method and a system for password transformation. The password remotely authentication method includes: the server generates the encrypted user information by using the system key and the user identifier inputted as the first hash function value and the user password inputted as the second hash function converse function value, and stores the encrypted user information to the intelligent card; when logging in the server, the intelligent card makes exponential operation for the encrypted user information with the second hash value as the power, and then obtaining the second encrypted user information, and calculates the third hash function value by using the second encrypted user information as an input, and sends the logging request message including the third hash function value to the server; the server validates the received third hash function value by the first hash function value and the second hash function value so as to realize password authentication.