‘ ‘ Foiling the Cracker ’ ’ : yA

نویسنده

  • Daniel V. Klein
چکیده

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was posr c sible to check roughly 800 passwords/second. Armed with a dictionary of 250,000 words, a cracke ould compare their encryptions with those all stored in the password file in a little more than five

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to ,

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to , Password Securit

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security

With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system ‘‘crackers,’’ data theft, data corruption very real. This paper outlines some of the problems of current password security by demonstrating the...

متن کامل

Design, Construction and Performance Evaluation of the Walnut Cracking Machine

The traditional method in Iran of cracking walnut manually, using harmer or knife cutter is laborintensive, slow and tedious; besides, most mechanical crackers do not give satisfactory results in terms of kernel extraction quality. A prototype machine was developed to crack walnut. A walnut cracker was designed, constructed and tested to evaluate its performance. The cracker, which consists of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990