scispace - formally typeset
Search or ask a question
Topic

Rainbow table

About: Rainbow table is a research topic. Over the lifetime, 488 publications have been published within this topic receiving 11528 citations.


Papers
More filters
Patent
11 Mar 1993
TL;DR: In this article, a table showing password data corresponding to the ID code is provided in the memory (b) 12 of a host computer, and a central processing unit 14 decides a current password by time information from a timer device 13 and the table in memory (B) 12, and security is checked by the password inputted from the terminal equipment 3 and the current password.
Abstract: PURPOSE:To automatically change a password corresponding to an ID code by means of a date and time and to improve security. CONSTITUTION:A table showing password data corresponding to the ID code is provided in the memory (b) 12 of a host computer. Password data of the table changes the password at every month or every date and time. When the ID code is inputted from a terminal equipment 3, a central processing unit 14 decides a current password by time information from a timer device 13 and the table in the memory (B) 12, and security is checked by the password inputted from the terminal equipment 3 and the current password.

4 citations

Proceedings ArticleDOI
14 Dec 2015
TL;DR: A novel dynamic salt generating scheme of great expansibility, future adoptability, and easy usability, at the same time, guarantees appreciable improvements on the aggregate security level of password storage.
Abstract: The expectancy in authentications that trump vagaries of cracking techniques have surfaced two blurred lines. One lays between low-entropy password adoption and commensurate encryption competence. The other is interposed between anonymizing authentication requisites and providing cookbooks for adversaries. The cutting-edge technologies are tailored to gain an edge, which nevertheless get bogged down in striking a balance, sometimes leading users astray. The bullish assumptions are being replaced by bearish ones. In need of compensating for the inadequacies, this paper puts forth a novel dynamic salt generating scheme of great expansibility, future adoptability, and easy usability, at the same time, guarantees appreciable improvements on the aggregate security level of password storage. Contrary to the conventional means, this scheme subtly generates salt values in the course of each authentication rather than retaining a storage. The whole scheme gets further enhanced by resonating with the innovative Seeds Warehouse Table. Apart from preserving the advantages while amortizing no extra cost across users, it is comparatively preferable owing to the provable boost in resistance to both hash collision and dictionary attacks.

4 citations

Patent
09 Apr 2014
TL;DR: In this paper, an encryption and analysis system based on a distributed GPU and a rainbow table and a method of the encryption-and-analysis system belongs to the field of mobile network encryption protocol data restoration.
Abstract: The invention discloses an encryption and analysis system based on a distributed GPU and a rainbow table and a method of the encryption and analysis system, and belongs to the field of mobile network encryption protocol data restoration. The system comprises a cipher text analyzing module (100), a GPU set processing module (200) and a rainbow table module (300), wherein the cipher text analyzing module (100) interacts with the GPU set processing module (200) so as to achieve extraction of front end cipher texts and distribution of encryption data of devices of the GPU; the GPU set processing module (200) interacts with the rainbow table module (300) so that the GPU can construct the rainbow table and search by means of the constructed rainbow table, and original texts are quickly restored. The system has high speed and extendibility and is suitable for mobile Internet security products.

3 citations

Journal Article
TL;DR: A practical efficient one-time password authentication protocol is presented which conquers common challenge-response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack.
Abstract: Some common onetime password authentication protocols are analyzed.A practical efficient onetime password authentication protocol is presented which based on the symmetric algorithm,which conquers common challengeresponse protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack.It also can boost up the security of the application security system by integrating with it.

3 citations

Journal Article
TL;DR: An iterative algorithm based on MD5 is proposed that is immune to the second birthday attack, meanwhile improve the complicates of the the first birthday attack and can enhance password security features, thereby enhancing the network information transmission and storage security.
Abstract: The paper analyzes the user name and password storage methods and their risks on the internet.On this basis,it analyzes MD5 message digest encryption weaknesses and deciphering means.In response to these decoding methods,it proposes an iterative algorithm based on MD5.This algorithm is immune to the second birthday attack,meanwhile improve the complicates of the the first birthday attack.It is also useful for rainbow table attack.The algorithm can enhance password security features,thereby enhancing the network information transmission and storage security.

3 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
84% related
Encryption
98.3K papers, 1.4M citations
82% related
Public-key cryptography
27.2K papers, 547.7K citations
82% related
Authentication
74.7K papers, 867.1K citations
79% related
Key (cryptography)
60.1K papers, 659.3K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20215
20206
201911
201810
201729
201630