scispace - formally typeset
Search or ask a question
Topic

Rainbow table

About: Rainbow table is a research topic. Over the lifetime, 488 publications have been published within this topic receiving 11528 citations.


Papers
More filters
Proceedings ArticleDOI
05 Apr 2009
TL;DR: This paper demonstrates the first known system, implemented in a state-of-the-art reconfigurable device that cracks passwords up to 1000 times faster than the software approach by using a highly parallel architecture employing a fine-grained pipeline.
Abstract: One of the most efficient methods for cracking passwords is the one based on ldquorainbow tablesrdquo; those lookup tables are offering an almost optimal time-memory tradeoff in the process of recovering the plaintext password from a password hash generated by a cryptographic hash function. In this paper, we demonstrate the first known system, implemented in a state-of-the-art reconfigurable device that cracks passwords up to 1000 times faster than the software approach. This is achieved by using a highly parallel architecture employing a fine-grained pipeline.

6 citations

Patent
02 Oct 2009
TL;DR: In this article, a de-duplication engine comprising a secret key is utilized to generate a secret-key hash of the at least one block of data, which is then compared with the secret key hash table of previously stored data on the storage system to identify duplicated data.
Abstract: Methods and systems for protecting de-duplication repositories against a malicious attack are disclosed. One method receives at least one block of data to store in a data storage system. A de-duplication engine comprising a secret key is utilized to generate a secret key hash of the at least one block of data. A comparison of the secret key hash of the at least one block of data with a secret key hash table of previously stored data on the data storage system to identify duplicated data, the secret key hash comparing protecting the data storage system against a malicious attack.

6 citations

Patent
Ravindra Kumar1
23 Mar 2006
TL;DR: In this article, a configuration differencing command generates a hash table of configuration keys and values for each of the configurations being compared, and a key is selected from a first hash table and the command determines if an identical key exists in the second hash table.
Abstract: A system and method for determining differences between configurations of a software program. A configuration differencing command generates a hash table of configuration keys and values for each of the configurations being compared. A key is selected from a first hash table and the command determines if an identical key exists in the second hash table. If the key exists in the second hash table, a comparison is made of the values associated with the keys and, if the values are not identical, the configuration differencing command displays the differences to an administrator.

6 citations

Patent
20 Nov 2013
TL;DR: In this paper, a Hash value password recovering method and device is presented, which comprises the steps of configuring system initialization information, generating rainbow tables by means of a CPU and a GPU and storing the rainbow tables in a rainbow table file in sequence.
Abstract: The invention provides a Hash value password recovering method and device. The method comprises the steps of configuring system initialization information; generating rainbow tables by means of a CPU and a GPU and storing the rainbow tables in a rainbow table file in sequence; acquiring a Hash value to be recovered from a Hash value file under the circumstance that the parameter of any one of the rainbow tables in the rainbow table file is matched with the parameter of a preset rainbow table; judging whether password recovery can be carried out on the Hash value to be recovered by means of the GPU; carrying out password recovery on the Hash value to be recovered by means of the GPU if the judging result is yes till passwords of all Hash values to be recovered in the Hash value file are recovered, wherein the system initialization information comprises the Hash algorithm type, information relevant to the rainbow tables and the like. According to the Hash value password recovering method and device, the rainbow tables are generated by means of the CPU and the GPU, the Hash value passwords are recovered through the combination of the GPU and the rain table algorithm, and therefore the time for recovering the Hash value passwords can be greatly shortened.

6 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
84% related
Encryption
98.3K papers, 1.4M citations
82% related
Public-key cryptography
27.2K papers, 547.7K citations
82% related
Authentication
74.7K papers, 867.1K citations
79% related
Key (cryptography)
60.1K papers, 659.3K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20215
20206
201911
201810
201729
201630