Cryptanalysis the SHA-256 Hash Function using Rainbow Tables

نویسندگان

چکیده

The research of the strength a hashed message is great importance in modern authentication systems. hashing process inextricably linked with password system, since passwords are usually stored system not clear text, but as hashes. SHA-256 hash function was chosen to model attack rainbow tables. An algorithm for constructing table Java language proposed. conditions under which use tables will be effective determined. This article aims practically show generating and organize an on function. As shows, can reveal three-character 3 seconds. bit increases, decryption time increases direct proportion.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Hash Function LUX-256

LUX is a new hash function submitted to NIST’s SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The freestart preimage attack has complexity of about 2 and requires...

متن کامل

Cryptanalysis of Reduced Variants of the FORK-256 Hash Function

FORK-256 is a hash function presented at FSE 2006.Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we present the first cryptanalytic results on this design strategy. First, we study a linearized variant of FORK-256, and show several unusual properties of this linearized variant. We also explain why the linearized model c...

متن کامل

Instruction sequence expressions for the secure hash algorithm SHA-256

The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe such instruction sequences for the restrictions to bit strings ...

متن کامل

Reducing Decryption Time of NTLM Hash Using Rainbow Tables

The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems.Using passwords and password management routines for giving access rights is a technique that is as quite old. The use of such weak hash functions in the process of user authentication in these operating systems poses a significant threat to a...

متن کامل

SHA-3: The BLAKE Hash Function

A global competition is currently taking place to select a hash function which will become a new standard in the field of cryptography. The competition was announced in 2007 by the National Institute of Standards and Technology (NIST) to find a successor to its previous Secure Hash Algorithm (SHA) standards, SHA-1 and SHA-2. The submissions have been narrowed down to a set of five, judged by th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Informatics

سال: 2022

ISSN: ['2089-3272']

DOI: https://doi.org/10.52549/ijeei.v10i4.4247