中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords
Author: Zou, Jing (1) ; Lin, Dongdai (1) ; Hao, Chunhui (2) ; Li, Zhenqi (2) ; Wang, Wenhao (1) ; Lu, Yao (1)
Keyword: Time-memory trade-off ; Cryptanalysis ; High hit ratio
Source: Chinese Journal of Electronics
Issued Date: 2013
Volume: 22, Issue:4, Pages:671-676
Indexed Type: SCI ; EI
Department: (1) State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; (2) Graduate University of Chinese Academy of Sciences, Beijing 100190, China; (3) Huaiyin Normal University, Huai'an 223300, China; (4) Laboratory of Complex Systems and Intelligence Science, Institute Automation, Chinese Academy of Sciences, Beijing 100190, China; (5) Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
Abstract: Most of implementations of the cryptanalytic time-memory trade-off attacks such as Hellman's original method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an exhaustive attack to passwords in a limited length range on a certain charset. However, the distributions of structures and strings making up real human memorable passwords do not appear random. Based upon these, we propose a method to generate passwords in those cryptanalytic time-memory trade-off methods. It achieves a higher hit ratio in attacking actual passwords and reduces search space drastically with requirement of only a little extra memory. It makes time-memory trade-off more practical. Even to attack long length passwords, the results of experiments show that our approach has a higher hit ratio compared with Oechslin's method. In addition, this method can be used in the distributed and parallel attack.
English Abstract: Most of implementations of the cryptanalytic time-memory trade-off attacks such as Hellman's original method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an exhaustive attack to passwords in a limited length range on a certain charset. However, the distributions of structures and strings making up real human memorable passwords do not appear random. Based upon these, we propose a method to generate passwords in those cryptanalytic time-memory trade-off methods. It achieves a higher hit ratio in attacking actual passwords and reduces search space drastically with requirement of only a little extra memory. It makes time-memory trade-off more practical. Even to attack long length passwords, the results of experiments show that our approach has a higher hit ratio compared with Oechslin's method. In addition, this method can be used in the distributed and parallel attack.
Language: 英语
WOS ID: WOS:000326666600004
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/16910
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Zou, Jing ,Lin, Dongdai ,Hao, Chunhui ,et al. Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords[J]. Chinese Journal of Electronics,2013-01-01,22(4):671-676.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zou, Jing (1)]'s Articles
[Lin, Dongdai (1)]'s Articles
[Hao, Chunhui (2)]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zou, Jing (1)]‘s Articles
[Lin, Dongdai (1)]‘s Articles
[Hao, Chunhui (2)]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace