rainbowtable Questions
2
Solved
I am having trouble understanding the following code from the golang crypto bcrypt repo
func newFromHash(hashedSecret []byte) (*hashed, error) {
if len(hashedSecret) < minHashSize {
return nil...
Linn asked 11/11, 2020 at 6:10
1
Solved
In this cryptography post it says
The chain can go as long as you want, until it hits the original input. When it hits that point, it will just repeat itself and it will be useless.
So my star...
Whiplash asked 9/7, 2014 at 2:40
4
Solved
Anyone know why it is called rainbow table? Just remembered we have learned there is an attack called "dictionary attack". Why it is not call dictionary?
Luthuli asked 19/2, 2011 at 15:21
4
Solved
I've been looking around for encryption and I've seen several implementations of Rainbow Tables work like charm on passwords (say windows).
I'm yet to see an implementation of a Rainbow atta...
Charlton asked 29/9, 2010 at 0:20
10
Solved
I'm having some trouble understanding the purpose of a salt to a password. It's my understanding that the primary use is to hamper a rainbow table attack. However, the methods I've seen to implemen...
Avaavadavat asked 7/1, 2009 at 15:55
6
Solved
Possible Duplicate:
md5 decoding. How they do it?
this page suggests that a hash algorithm like md5() and sha1() can be reversed because of the huge processing power that we have nowa...
Observation asked 23/9, 2011 at 2:22
6
Solved
As I understand it, the best practice for generating salts is to use some cryptic formula (or even magic constant) stored in your source code.
I'm working on a project that we plan on releasing as...
Endothelium asked 29/10, 2009 at 17:0
4
Solved
let's just assume a simple non salted hash function, just a plain old $hash = md5($pass).
Premises:
the password hashing all takes place server side, and the hashes are stored in the database. T...
Marlenmarlena asked 12/5, 2011 at 19:25
3
Solved
I've carefully read about rainbow tables and can't get one thing. In order to build a hash chain a reduction function is used. It's a function that somehow maps hashes onto passwords. This article ...
Muttonhead asked 21/4, 2011 at 8:3
3
Solved
In explanations I've read about public key cryptography, it is said that some large number is come up with by multiplying together 2 extremely large primes. Since factoring the product of large pri...
Ebenezer asked 16/7, 2010 at 17:59
7
Solved
I've spent the past 2 hours reading up on salting passwords, making sure that I understood the idea. I was hoping some of you could share your knowledge on my conclusions.
If I'm an attacker, and...
Verlaverlee asked 17/11, 2009 at 3:18
4
Solved
When we say dictionary attack, we don't really mean a real dictionary, do we? My guess is we mean a hacker's dictionary i.e. rainbow tables, right?
My point is we're not talking about someone keyi...
Ambulatory asked 10/10, 2009 at 10:34
1
© 2022 - 2024 — McMap. All rights reserved.