Topic
Rainbow table
About: Rainbow table is a research topic. Over the lifetime, 488 publications have been published within this topic receiving 11528 citations.
Papers published on a yearly basis
Papers
More filters
01 Jan 2017
6 citations
••
05 Apr 2009TL;DR: This paper demonstrates the first known system, implemented in a state-of-the-art reconfigurable device that cracks passwords up to 1000 times faster than the software approach by using a highly parallel architecture employing a fine-grained pipeline.
Abstract: One of the most efficient methods for cracking passwords is the one based on ldquorainbow tablesrdquo; those lookup tables are offering an almost optimal time-memory tradeoff in the process of recovering the plaintext password from a password hash generated by a cryptographic hash function. In this paper, we demonstrate the first known system, implemented in a state-of-the-art reconfigurable device that cracks passwords up to 1000 times faster than the software approach. This is achieved by using a highly parallel architecture employing a fine-grained pipeline.
6 citations
•
02 Oct 2009
TL;DR: In this article, a de-duplication engine comprising a secret key is utilized to generate a secret-key hash of the at least one block of data, which is then compared with the secret key hash table of previously stored data on the storage system to identify duplicated data.
Abstract: Methods and systems for protecting de-duplication repositories against a malicious attack are disclosed. One method receives at least one block of data to store in a data storage system. A de-duplication engine comprising a secret key is utilized to generate a secret key hash of the at least one block of data. A comparison of the secret key hash of the at least one block of data with a secret key hash table of previously stored data on the data storage system to identify duplicated data, the secret key hash comparing protecting the data storage system against a malicious attack.
6 citations
•
23 Mar 2006TL;DR: In this article, a configuration differencing command generates a hash table of configuration keys and values for each of the configurations being compared, and a key is selected from a first hash table and the command determines if an identical key exists in the second hash table.
Abstract: A system and method for determining differences between configurations of a software program. A configuration differencing command generates a hash table of configuration keys and values for each of the configurations being compared. A key is selected from a first hash table and the command determines if an identical key exists in the second hash table. If the key exists in the second hash table, a comparison is made of the values associated with the keys and, if the values are not identical, the configuration differencing command displays the differences to an administrator.
6 citations
•
20 Nov 2013
TL;DR: In this paper, a Hash value password recovering method and device is presented, which comprises the steps of configuring system initialization information, generating rainbow tables by means of a CPU and a GPU and storing the rainbow tables in a rainbow table file in sequence.
Abstract: The invention provides a Hash value password recovering method and device. The method comprises the steps of configuring system initialization information; generating rainbow tables by means of a CPU and a GPU and storing the rainbow tables in a rainbow table file in sequence; acquiring a Hash value to be recovered from a Hash value file under the circumstance that the parameter of any one of the rainbow tables in the rainbow table file is matched with the parameter of a preset rainbow table; judging whether password recovery can be carried out on the Hash value to be recovered by means of the GPU; carrying out password recovery on the Hash value to be recovered by means of the GPU if the judging result is yes till passwords of all Hash values to be recovered in the Hash value file are recovered, wherein the system initialization information comprises the Hash algorithm type, information relevant to the rainbow tables and the like. According to the Hash value password recovering method and device, the rainbow tables are generated by means of the CPU and the GPU, the Hash value passwords are recovered through the combination of the GPU and the rain table algorithm, and therefore the time for recovering the Hash value passwords can be greatly shortened.
6 citations