scispace - formally typeset
Search or ask a question
Topic

Rainbow table

About: Rainbow table is a research topic. Over the lifetime, 488 publications have been published within this topic receiving 11528 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jul 2017
TL;DR: This paper introduces an optimized brute force password recovery implementation for SHA-512 on GPU that reaches 1055M hash/second on double AMD R9 290 GPUs.
Abstract: One-way hash algorithms, including MD4, MD5 and SHA family, have been widely used in password protection. Focusing on brute force password recovery for one-way hash algorithm, the amount of computation depends on the complexity of the algorithm. This paper introduces an optimized brute force password recovery implementation for SHA-512 on GPU. By using several optimization methods, the performance reaches 1055M hash/second on double AMD R9 290 GPUs. Compared with Hashcat, our implementation is about 11% faster.

10 citations

Proceedings ArticleDOI
13 Apr 2017
TL;DR: This work suggests enhanced password processing scheme based on image using visual cryptography (VC), which has lower computation, prevents cyber-attack aimed at hash-cracking, and supports authentication not to expose personal information such as ID to attackers.
Abstract: Traditional password conversion scheme for user authentication is to transform the passwords into hash values. These hash-based password schemes are comparatively simple and fast because those are based on text and famed cryptography. However, those can be exposed to cyber-attacks utilizing password by cracking tool or hash-cracking online sites. Attackers can thoroughly figure out an original password from hash value when that is relatively simple and plain. As a result, many hacking accidents have been happened predominantly in systems adopting those hash-based schemes. In this work, we suggest enhanced password processing scheme based on image using visual cryptography (VC). Different from the traditional scheme based on hash and text, our scheme transforms a user ID of text type to two images encrypted by VC. The user should make two images consisted of subpixels by random function with SEED which includes personal information. The server only has user's ID and one of the images instead of password. When the user logs in and sends another image, the server can extract ID by utilizing OCR (Optical Character Recognition). As a result, it can authenticate user by comparing extracted ID with the saved one. Our proposal has lower computation, prevents cyber-attack aimed at hash-cracking, and supports authentication not to expose personal information such as ID to attackers.

10 citations

Patent
Prashant Anand1, Ashish Anand1
10 Jan 2013
TL;DR: In this paper, an index table stored in local memory is used to perform an enhanced lookup on the hash table stored on external memory, where the index table stores signature patterns that are derived from the hash keys stored in the hash entries.
Abstract: The present invention relates to methods and apparatus for performing a lookup on a hash table stored in external memory. An index table stored in local memory is used to perform an enhanced lookup on the hash table stored in external memory. The index table stores signature patterns that are derived from the hash keys stored in the hash entries. Using the stored signature patterns, the packet processing node predicts which hash key is likely to store the desired data. The prediction may yield a false positive, but will never yield a false negative. Thus, the hash table is accessed only once during a data lookup.

10 citations

Patent
28 Mar 2014
TL;DR: In this paper, a computer processor and a security enhancing chip may be provided, where the computer processor may contain a storage for storing an encryption key, a central processing unit (CPU) configured to execute one or more software programs, and a circuit configured to calculate a hash function to generate a hash value for data loaded into the processor and generate an authentication token for a request initiated by a software program running on the CPU.
Abstract: A computer processor and a security enhancing chip may be provided. In one aspect, the computer processor may comprise a storage for storing an encryption key, a central processing unit (CPU) configured to execute one or more software programs, and a circuit configured to calculate a hash function to generate a hash value for data loaded into the computer processor and generate an authentication token for a request initiated by a software program running on the CPU. In another aspect, the security enhancing chip may comprise a first storage for storing an encryption key, a second storage for storing a certificate, a hash storage and circuit components configured to validate, using the first certificate, command(s) adding the encryption key to the first storage and storing a first hash to the hash storage, and to process a request if a second hash in the request is equal to the first hash.

10 citations

Patent
25 Jan 2017
TL;DR: A 2003 document cracking system based on FPGA hardware and a method is described in this article, which consists of a PC, an input interface module, a crack module and an output interface module which are connected sequentially.
Abstract: The invention discloses a word2003 document cracking system based on FPGA hardware and a method. The system comprises a PC, an input interface module, a crack module and an output interface module which are connected sequentially, and the PC is connected with the output interface module. The crack module comprises a sub-key generation module, a rainbow table matching module and a key cracking module which are connected sequentially. The sub-key generation module includes sub-key round robin controller, MD5 algorithm module and RC4 algorithm module which are connected sequentially. The key cracking module consists of algorithm round robin controller, MD5 algorithm module and RC4 algorithm module. The system achieves document cracking by using the time and space folding algorithm of the rainbow table, thus improving the crack efficiency and reducing the cracking time. On the basis of considering the technical characteristics of the rainbow table and the FPGA, the appropriate rainbow table is used for cracking, thus solving the contradiction between cracking time and resource consumption.

9 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
84% related
Encryption
98.3K papers, 1.4M citations
82% related
Public-key cryptography
27.2K papers, 547.7K citations
82% related
Authentication
74.7K papers, 867.1K citations
79% related
Key (cryptography)
60.1K papers, 659.3K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20215
20206
201911
201810
201729
201630