期刊文献+

彩虹表在密码破解中的应用 被引量:3

Application of Rainbow Table in Password Cracking
原文传递
导出
摘要 密码作为一门科学,有着悠久的历史,在人类社会的发展过程中起到了至关重要的作用,如今的信息时代,密码应用更加广泛。在电子证据取证过程中就常遇到重要文档资料设置密码的情况,如办公软件Word、WPS形成的加密文档,以及Windows操作系统密码等。通过对加密文档或操作系统密码生成和存储方式的研究,在实践中利用3次换算的彩虹表破解这些密码具有方便快捷的优点,可以更好地协助电子证据取证工作。 Password as a science, has a long history and plays a crucial role in the development of human society, and parucutany in today's information age, the password is more widely used. In the process of electronic evidence, a situation is often encountered that the password is established on the important documents such as office software WORD, WPS, and the Windows operating system. The study and practice of document or operating system password generation and storage indicates that, by using time-conversion rainbow tables, convenient and fast password-crack could be realized, and this could be a better assistance to the forensic work.
出处 《信息安全与通信保密》 2010年第11期54-55,58,共3页 Information Security and Communications Privacy
关键词 彩虹表 密码 破解 rainbow table crack password
  • 相关文献

参考文献2

二级参考文献3

共引文献9

同被引文献8

  • 1HELLMANM E. A Cryptanalytic Time-memory Trade Oft[C]// IEEE. IEEETransactions on Information Theory. NewOrleans, UnitedStates: IEEE Publications, 1980: 401-406.
  • 2OECHSLIN Philippe. Making a Faster Cryptanalytic Time- memory Trade-off[J]. Lecture Notes in Computer Science, 2003, 279: 617-630.
  • 3KLEIND V. Foiling the Cracker: A Survey of, and Improvements to, Password Security[C]//2na UsenixSecurity Workshop. Proceedings of USENIX 1990. California, United States: USENIX Publications, 1990: 5-14.
  • 4SCHWEITZER Dino, BOLENG Jeff, HUGHES Colin, et al. Visualizing Keyboard Pattern Passwords[J]. Information Visualization, 2011(10): 127-133.
  • 5WEIR M, AGGARWAL S, de MEDIROS B, et al. Password Cracking using Probabilistic Context-free Grammars[C]// IEEE. IEEE Symposium on Security and Privacy. NewOrleans, United States: IEEE Publications, 2009: 391-405.
  • 6荣凯,邱卫东,李萍.基于彩虹表的Hash攻击研究[J].信息安全与通信保密,2011,9(4):74-76. 被引量:6
  • 7王伟,周顺先.双重门限秘密共享方案[J].通信技术,2011,44(3):96-98. 被引量:2
  • 8梁艳,张琛岭,邱卫东.基于生成元的彩虹表[J].信息安全与通信保密,2012,10(12):85-87. 被引量:2

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部