期刊文献+

密码口令破解彩虹表查找系统设计与实现

Design and implementation of the rainbow table lookup system based on password cracking
下载PDF
导出
摘要 当前网络犯罪越来越严重,破解犯罪嫌疑人计算机中的的密码信息则需要技术支持。文章研究了彩虹表的构造原理、破解密码口令的过程,并结合MIC众核协处理器强大的计算能力,设计实现了密码口令破解彩虹表查找系统,并行化的设计提高了彩虹表的生成速度,归约函数的设计提高了明文查找成功率。 At present,cyber crimes are becoming more and more serious.It requires technical support to crack the password information in the suspect's computer.In this paper,the construction principle of rainbow table and the process of password cracking are studied.Combined with the powerful computing power of MIC,a password cracking system based on rainbow table lookup is designed and realized.The design of parallelization improves the generation speed of rainbow table,and the design of reduction function improves the success rate of plaintext search.
作者 张冬芳 管磊 戴晓苗 Zhang Dongfang;Guan Lei;Dai Xiaomiao(The First Research Institute of the Ministry of Public Security,Beijing 100048)
出处 《网络空间安全》 2020年第11期1-5,共5页 Cyberspace Security
关键词 密码破解 彩虹表 众核协处理器 并行化 password cracking rainbow table many integrated core parallelization
  • 相关文献

参考文献3

二级参考文献13

  • 1HELLMANM E. A Cryptanalytic Time-memory Trade Oft[C]// IEEE. IEEETransactions on Information Theory. NewOrleans, UnitedStates: IEEE Publications, 1980: 401-406.
  • 2OECHSLIN Philippe. Making a Faster Cryptanalytic Time- memory Trade-off[J]. Lecture Notes in Computer Science, 2003, 279: 617-630.
  • 3KLEIND V. Foiling the Cracker: A Survey of, and Improvements to, Password Security[C]//2na UsenixSecurity Workshop. Proceedings of USENIX 1990. California, United States: USENIX Publications, 1990: 5-14.
  • 4SCHWEITZER Dino, BOLENG Jeff, HUGHES Colin, et al. Visualizing Keyboard Pattern Passwords[J]. Information Visualization, 2011(10): 127-133.
  • 5WEIR M, AGGARWAL S, de MEDIROS B, et al. Password Cracking using Probabilistic Context-free Grammars[C]// IEEE. IEEE Symposium on Security and Privacy. NewOrleans, United States: IEEE Publications, 2009: 391-405.
  • 6Hellman M E. A cryptanalytic time-memory trade off[J]. IEEE Transaction on Information Theory, 1980, IT-26: 401-406.
  • 7Philippe Oechslin. Making a faster cryptanalytic time- memory trade-off[C]//Annual International Cryptology Conference(CRYPTO), Advances in Cryptography Lecture Notes in Computer Science, 2003, 279: 617-630.
  • 8Lars George. HBase: The Definitive Guide [M]. O'REILLY, Media Inc, 2011.
  • 9王紫阳,赵旺,田渝,韩远凌.彩虹表在密码破解中的应用[J].信息安全与通信保密,2010,7(11):54-55. 被引量:3
  • 10李昕,曹天杰,米国粹,邹静.基于分布式环境下的彩虹表密码攻击[J].计算机应用与软件,2011,28(2):290-293. 被引量:4

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部