期刊文献+

基于分布式环境下的彩虹表密码攻击 被引量:4

PASSWORD CRACKING BASED ON RAINBOW TABLE IN DISTRIBUTED COMPUTING ENVIRONMENT
下载PDF
导出
摘要 密码安全是被经常讨论的问题。分析了基于彩虹表的密码破解的基本原理,首先介绍了哈希链,分析了其原理和缺点,即容易出现链冲突。随后引出彩虹链,分析了其工作原理及优势。并使用分布式计算环境对彩虹表的分布式计算、分布式存储,分布式攻击等进行了相关研究。 Password security is a topic frequently discussed.In this paper,we analyze the rationale of password cracking based on rainbow table.Firstly we introduce the hash chain,analyze its theory and its shortcomings,i.e.it is easy to come force the chain conflict.Then we introduce the rainbow chain,analyze its operation theory and advantages.By using distributed computation environment,correlated studies on distributed computing,distributed storage and distributed attacking on rainbow table are discussed.
出处 《计算机应用与软件》 CSCD 2011年第2期290-293,共4页 Computer Applications and Software
基金 中国矿业大学青年科研基金项目(2007A039)
关键词 密码安全 分布式攻击 彩虹表 Password security Distributed attacking Rainbow table
  • 相关文献

参考文献5

  • 1Hellman M E.A cryptanalytie time-memory trade off[J].IEEE Transactions on Information Theory,IT-26,1980:401-406. 被引量:1
  • 2Oechslin P.Making a Faster Cryptanalytic Time-Memory Trade-Off[J],Lecture Notes in Computer Science,Volume 2729,2003:617-630. 被引量:1
  • 3Borst J,Preneel B,Vandewalle J.On time-memory tradeoff between exhaustive key search and table precomputation[J].On Information Theory in the Benelux,1998:111-118. 被引量:1
  • 4Cosnard M,PHILIPPE J L.Distributed Algorithms for deciphering[J].[S.I.]:[s.n.].2007. 被引量:1
  • 5http://en.wikipedia.org/wiki/Rainbow_tables. 被引量:1

同被引文献21

  • 1Oechslin P. Making a Faster Cryptanalytic Time-memory Trade-off[C]//Proc. of the 23rd Annual International Crypto- logy Conference on Advances in Cryptology-CRYPTO. Santa Barbara, USA: [s. n.], 2003: 617-630. 被引量:1
  • 2Kestas J. How Rainbow Tables Work[EB/OL]. (2012-06-01). http://kestas.kuliukas.com/RainbowTables. 被引量:1
  • 3Hellman M. A Cryptanalytic Time-memory Trade-off[J]. IEEE Trans. on Information Theory, 1980, 26(4): 401-406. 被引量:1
  • 4Denning D R. Cryptography and Data Security[M]. Boston, USA: Addison-Wesley, 1982. 被引量:1
  • 5Standaert F X, Rouvroy G, Quisquater J J, et al. A Time- memory Tradeoff Using Distinguished Points: New Analysis and FPGA Results[C]//Proc. of Cryptographic Hardware and Embedded Systems. London, UK: Springer-Verlag, 2002. 被引量:1
  • 6Saran N. Time Memory Trade off Attack on Symmetric Ciphers[D]. Turkey, USA: Middle East Technical University, 2009. 被引量:1
  • 7Borst J. Block Ciphers: Design, Analysis, and Side-channel Analysis[D]. Flanders, Belgium: Catholic University of Leuven, 2001. 被引量:1
  • 8Graves R E. High Performance Password Cracking by Implementing Rainbow Tables on nVidia Graphics Cards (IseCrack)[D]. Ames, USA: Iowa State University, 2008. 被引量:1
  • 9Jin Hong. The Cost of False Alarms in Hellman and Rainbow Tradeoffs[J]. Journal of Designs, Codes and Cryptography, 2010, 57(3): 293-327. 被引量:1
  • 10Xiaoyun Wang,Hongbo Yu. How to Break MD5 and Oth- er Hash Functions [ C ]//EUROCRYPT 2005. [ S. 1. ] : LNCS,3494 : 19 - 35. 被引量:1

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部