• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng. An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack[J]. Journal of Computer Research and Development, 2014, 51(5): 1089-1094.
Citation: Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng. An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack[J]. Journal of Computer Research and Development, 2014, 51(5): 1089-1094.

An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack

More Information
  • Published Date: May 14, 2014
  • The time-memory trade-off algorithm is a method for quickly inverting a one-way function using pre-computed tables. Since its first introduction by Hellman, many variants and their analysis results have appeared. Oechslin suggested the so-called rainbow tables which made the method efficient and effective for cryptanalytic attacks. The Checkpoints method is a technique that reduces the number of table lookups performed by the algorithm. In this paper, we propose a new method using a novel design of pre-computed table structure. Compared with the rainbow method, the new design achieves distinct reduction in term of the storage requirement. We apply the method on the example of 8-character possible password composed from a character set of 95 different typeable characters. The number of records stored in the storage can increase with about 70% in our example compared with the rainbow method, which also leads to the increase of 7.8% to 15.6% (for different chain lengths) in terms of the success rate of attack if the storage requirement and the computational complexity remain the same. What’s more, our method can further use Checkpoints technique to reduce the complexity of on line computation with 15% to 20% by setting a checkpoint in the middle position of the chain.
  • Related Articles

    [1]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [2]Wang Haiyan, Xiao Yikang. Dynamic Group Discovery Based on Density Peaks Clustering[J]. Journal of Computer Research and Development, 2018, 55(2): 391-399. DOI: 10.7544/issn1000-1239.2018.20160928
    [3]Fan Zhiqiang and Zhao Qinping. A Data-Clustering Based Robust SIFT Feature Matching Method[J]. Journal of Computer Research and Development, 2012, 49(5): 1123-1129.
    [4]Yu Canling, Wang Lizhen, and Zhang Yuanwu. An Enhancement Algorithm of Cluster Boundaries Precision Based on Grid's Density Direction[J]. Journal of Computer Research and Development, 2010, 47(5): 815-823.
    [5]Ma Haitao, Hao Zhongxiao, Zhu Yan. Checking Active XML Validation[J]. Journal of Computer Research and Development, 2008, 45(9): 1554-1560.
    [6]Chen Jianmei, Lu Hu, Song Yuqing, Song Shunlin, Xu Jing, Xie Conghua, Ni Weiwei. A Possibility Fuzzy Clustering Algorithm Based on the Uncertainty Membership[J]. Journal of Computer Research and Development, 2008, 45(9): 1486-1492.
    [7]Lü Zonglei, Wang Jiandong, Li Ying, and Zai Yunfeng. An Index of Cluster Validity Based on Modal Logic[J]. Journal of Computer Research and Development, 2008, 45(9): 1477-1485.
    [8]Jin Jun and Zhang Daoqiang. Semi-Supervised Robust On-Line Clustering Algorithm[J]. Journal of Computer Research and Development, 2008, 45(3): 496-502.
    [9]Ding Shifei, Shi Zhongzhi, Jin Fengxiang, Xia Shixiong. A Direct Clustering Algorithm Based on Generalized Information Distance[J]. Journal of Computer Research and Development, 2007, 44(4): 674-679.
    [10]Yue Shihong, Wang Zhengyou. Bisecting Grid-Based Clustering Approach and Its Validity[J]. Journal of Computer Research and Development, 2005, 42(9): 1505-1510.

Catalog

    Article views (1067) PDF downloads (550) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return