2017
DOI: 10.3233/jifs-169147
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the use of Rainbow Tables to break hash

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Salts defend against a pre-computed hash attack, e.g., rainbow tables [ 120 ]. Since salts do not have to be memorized by humans, they can make the size of the hash table required for a successful attack prohibitively large without placing a burden on the users.…”
Section: Applicationsmentioning
confidence: 99%
“…Salts defend against a pre-computed hash attack, e.g., rainbow tables [ 120 ]. Since salts do not have to be memorized by humans, they can make the size of the hash table required for a successful attack prohibitively large without placing a burden on the users.…”
Section: Applicationsmentioning
confidence: 99%
“…This has to be done in agreement with the attribute authority. We assume that for private attributes the rainbow attack [ 42 ] is hard. To create a secret key of client for an attribute , it has to contact the relevant attribute authority and after proving its identity, a secret key (or in case that the attribute authority follows a privacy preserving approach) will be generated by the attribute authority as in ( 1 ).…”
Section: Model Descriptionmentioning
confidence: 99%
“…The success rates of the rainbow tables for A5/1 are improved in [12]. Rainbow tables are commonly used to invert hash functions and crack passwords [13][14][15][16][17]. Even though rainbow tables are ubiquitously used in the real world applications, Biryukov et al show that Hellman tables are superior to rainbow tables in multiple data scenario [31].…”
Section: Hellman and Rainbow Tablesmentioning
confidence: 99%
“…The tradeoff attacks can be quite effective against some real world cryptographic primitives. The tradeoff tables can be used in practical applications to break real life ciphers such as A5/1 for the GSM encryption [10][11][12] or to crack passwords by finding preimages to hash functions [13][14][15][16][17]. In this chapter, we introduce briefly how to use tradeoff tables to invert small sized one-way functions.…”
Section: Introductionmentioning
confidence: 99%