期刊文献+

基于生成元的彩虹表 被引量:2

Rainbow Table based on Generator-A New Way of Rainbow Table Generation
原文传递
导出
摘要 彩虹表是破解hash口令的常用工具之一,它可以有效地提高破解速度,但传统的遍历完整明文空间的彩虹表在面对超过10位的长口令时,其生成时间是无法忍受的,用传统方式破解10位以上长口令,破解成功率较低。结合人为设置口令的相关特点,从压缩明文空间的角度出发,文中提出一种全新的基于生成元的彩虹表生成方式。基于生成元的彩虹表,其明文空间中剔除了大量出现概率极低的口令,使得长口令彩虹表的生成时间缩短在可接受的范围内,为破解人为设置的长口令提供了一种切实可行的方案。 Rainbow tables are usually used to crack hash passwords, and it could effectively improve the crack speed. However, the time cost for generating a long-password (more than 10 characters) rainbow table could not be tolerated, and the cracking also has a low success rate. A new idea of rainbow table based on generator is proposed, and this rainbow table could greatly compress the plaintext space. It is based on some universal law of the process of artificial long passwords, and in this way a lot of low-probability passwords are removed from the plaintext space. It makes the generation of rainbow table for long passwords acceptable and provides an operable method to crack artificial long passwords.
出处 《信息安全与通信保密》 2012年第12期85-87,共3页 Information Security and Communications Privacy
关键词 彩虹表 生成元 长口令破解 rainbow table generator long password cracking
  • 相关文献

参考文献8

  • 1HELLMANM E. A Cryptanalytic Time-memory Trade Oft[C]// IEEE. IEEETransactions on Information Theory. NewOrleans, UnitedStates: IEEE Publications, 1980: 401-406.
  • 2荣凯,邱卫东,李萍.基于彩虹表的Hash攻击研究[J].信息安全与通信保密,2011,9(4):74-76. 被引量:6
  • 3OECHSLIN Philippe. Making a Faster Cryptanalytic Time- memory Trade-off[J]. Lecture Notes in Computer Science, 2003, 279: 617-630.
  • 4王紫阳,赵旺,田渝,韩远凌.彩虹表在密码破解中的应用[J].信息安全与通信保密,2010,7(11):54-55. 被引量:3
  • 5KLEIND V. Foiling the Cracker: A Survey of, and Improvements to, Password Security[C]//2na UsenixSecurity Workshop. Proceedings of USENIX 1990. California, United States: USENIX Publications, 1990: 5-14.
  • 6SCHWEITZER Dino, BOLENG Jeff, HUGHES Colin, et al. Visualizing Keyboard Pattern Passwords[J]. Information Visualization, 2011(10): 127-133.
  • 7WEIR M, AGGARWAL S, de MEDIROS B, et al. Password Cracking using Probabilistic Context-free Grammars[C]// IEEE. IEEE Symposium on Security and Privacy. NewOrleans, United States: IEEE Publications, 2009: 391-405.
  • 8王伟,周顺先.双重门限秘密共享方案[J].通信技术,2011,44(3):96-98. 被引量:2

二级参考文献14

共引文献7

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部