Title :
Rainbow table to crack password using MD5 hashing algorithm
Author :
Kumar, Harish ; Kumar, Sudhakar ; Joseph, Rex ; Kumar, Dinesh ; Singh, Sunil Kumar Shrinarayan ; Kumar, Ajit ; Kumar, Pranaw
Author_Institution :
Sch. of Inf. Technol. & Eng. (SITE), VIT Univ., Vellore, India
Abstract :
Rainbow tables are basically huge tables filled with hash values and are used to find required password. Rainbow Table is used by the hackers to find the password by reversing the hashing function. Hashing the plaintext or password is a 1-way function which implies that hash can´t be decrypted to find the required password[10]. To authenticate the user a system takes the hash value generated by the hash function on user´s computer and it is compared with the hash value stored in the table on the server machine. If the hash matches, then the user is authenticated and can access the system. Rainbow tables are used to crack the password in short amount of time as compared to brute force technique, but it takes a lot of storage to hold rainbow table itself[1]. It is the most efficient methods for cracking passwords. This paper presents the implementation of Rainbow tables for cracking passwords of operating systems such as Windows7 and application which uses Message Digest v5(MD5) and Simple Hash Algorithmv1(SHA1) as their password hashing mechanism. It discusses the functionality of Rainbow Tables and its advantages over conventional brute-force approach and the usage of rainbow table to crack windows password.
Keywords :
cryptography; operating systems (computers); table lookup; 1-way function; MD5 hashing algorithm; Message Digest v5; SHA1; Simple Hash Algorithmv1; Windows7; brute force technique; brute-force approach; hash values; hashing function; operating systems; password hashing mechanism; rainbow table; server machine; user authentication; windows password; Decision support systems; MD5; Time-memory Trade-off; character set; cryptanalysis time; hash speed; success probability;
Conference_Titel :
Information & Communication Technologies (ICT), 2013 IEEE Conference on
Conference_Location :
JeJu Island
Print_ISBN :
978-1-4673-5759-3
DOI :
10.1109/CICT.2013.6558135