scholarly journals An Improved Rainbow Table Attack for Long Passwords

2017 ◽  
Vol 107 ◽  
pp. 47-52 ◽  
Author(s):  
Lijun Zhang ◽  
Cheng Tan ◽  
Fei Yu
Keyword(s):  
Author(s):  
Vrizlynn L. L. Thing ◽  
Hwei-Ming Ying

As users become increasingly aware of the need to adopt strong password, it brings challenges to digital forensics investigators due to the password protection of potential evidentiary data. On the other hand, due to human nature and their tendency to select memorable passwords, which compromises security for convenience, users may select strong passwords by considering a permutation of dictionary words. In this chapter, the authors discuss the existing password recovery methods and identify promising password recovery approaches. They also present their previous work on the design of a time-memory tradeoff pre-computed table coupled with a new sorting algorithm, and its two new storage mechanisms. The results on the evaluation of its password recovery performance are also presented. In this chapter, the authors propose the design of a new password recovery table by integrating the construction of common passwords within the enhanced rainbow table to incorporate the two promising password recovery approaches. They then present the theoretical proof of the feasibility of this technique.


2012 ◽  
Vol 11 (1) ◽  
pp. 11 ◽  
Author(s):  
Lauren Schwartz ◽  
Graham V Brown ◽  
Blaise Genton ◽  
Vasee S Moorthy

TEMATIK ◽  
2018 ◽  
Vol 5 (2) ◽  
pp. 56-67
Author(s):  
Rita Komalasari

Mekanisme kontrol yang paling umum untuk mengotentikasi pengguna sistem informasi terkomputerisasi adalah penggunaan password. Tulisan ini membahas kesenjangan dalam mengevaluasi karakteristik dari password yang digunakan kehidupan dalam nyata dan menyajikan hasil studi empiris pada penggunaan password dan resiko serangan dari hacker menggunakan berbagai metode (key logger, phising, shoulder surfing, dictionary, rainbow table). Penelitian ini memberikan manfaat bagi masyarakat mengenai tentang bagaimana seorang hacker dapat dengan mudah memprediksi dan mungkin meretas password. Studi ini memungkinkan pengguna untuk menjadi lebih waspada pada saat menggunakan web online dan layanan cloud yang melakukan berdasarkan password dan username.


2017 ◽  
Vol 21 (1) ◽  
pp. 1187-1187
Author(s):  
Hyung-Jin Mun ◽  
Sunghyuck Hong ◽  
Jungpil Shin
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document