A modified exhaustive search on a password system using SHA-1
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Minchul | - |
dc.contributor.author | Jung, Younghoon | - |
dc.contributor.author | Song, Junghwan | - |
dc.date.accessioned | 2022-07-14T01:57:32Z | - |
dc.date.available | 2022-07-14T01:57:32Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2017-06 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/152232 | - |
dc.description.abstract | In this paper, we show a method of exhaustive search on a password system that uses SHA-1 iteratively. Our method uses both the technique shown in Steube [16] and a technique for computing repetitions of SHA-1. Combining these two techniques reduces the total number of operations. We also show how to apply our method to MS Office (Microsoft Office) 2007/2010. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | A modified exhaustive search on a password system using SHA-1 | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Song, Junghwan | - |
dc.identifier.doi | 10.1007/s10207-016-0332-2 | - |
dc.identifier.scopusid | 2-s2.0-85027989606 | - |
dc.identifier.wosid | 000401126500003 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.16, no.3, pp.263 - 269 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.title | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.volume | 16 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 263 | - |
dc.citation.endPage | 269 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordAuthor | Security evaluation | - |
dc.subject.keywordAuthor | SHA-1 | - |
dc.subject.keywordAuthor | Microsoft Office | - |
dc.subject.keywordAuthor | Exhaustive search | - |
dc.subject.keywordAuthor | Password cracking | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s10207-016-0332-2 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.