中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords

文献类型:期刊论文

作者Zou, Jing (1) ; Lin, Dongdai (1) ; Hao, Chunhui (2) ; Li, Zhenqi (2) ; Wang, Wenhao (1) ; Lu, Yao (1)
刊名Chinese Journal of Electronics
出版日期2013
卷号22期号:4页码:671-676
ISSN号10224653
关键词Time-memory trade-off Cryptanalysis High hit ratio
中文摘要Most of implementations of the cryptanalytic time-memory trade-off attacks such as Hellman's original method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an exhaustive attack to passwords in a limited length range on a certain charset. However, the distributions of structures and strings making up real human memorable passwords do not appear random. Based upon these, we propose a method to generate passwords in those cryptanalytic time-memory trade-off methods. It achieves a higher hit ratio in attacking actual passwords and reduces search space drastically with requirement of only a little extra memory. It makes time-memory trade-off more practical. Even to attack long length passwords, the results of experiments show that our approach has a higher hit ratio compared with Oechslin's method. In addition, this method can be used in the distributed and parallel attack.
英文摘要Most of implementations of the cryptanalytic time-memory trade-off attacks such as Hellman's original method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an exhaustive attack to passwords in a limited length range on a certain charset. However, the distributions of structures and strings making up real human memorable passwords do not appear random. Based upon these, we propose a method to generate passwords in those cryptanalytic time-memory trade-off methods. It achieves a higher hit ratio in attacking actual passwords and reduces search space drastically with requirement of only a little extra memory. It makes time-memory trade-off more practical. Even to attack long length passwords, the results of experiments show that our approach has a higher hit ratio compared with Oechslin's method. In addition, this method can be used in the distributed and parallel attack.
收录类别SCI ; EI
语种英语
WOS记录号WOS:000326666600004
公开日期2014-12-16
源URL[http://ir.iscas.ac.cn/handle/311060/16910]  
专题软件研究所_软件所图书馆_期刊论文
推荐引用方式
GB/T 7714
Zou, Jing ,Lin, Dongdai ,Hao, Chunhui ,et al. Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords[J]. Chinese Journal of Electronics,2013,22(4):671-676.
APA Zou, Jing ,Lin, Dongdai ,Hao, Chunhui ,Li, Zhenqi ,Wang, Wenhao ,&Lu, Yao .(2013).Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords.Chinese Journal of Electronics,22(4),671-676.
MLA Zou, Jing ,et al."Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords".Chinese Journal of Electronics 22.4(2013):671-676.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。