• A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically...
    24 KB (3,485 words) - 12:15, 28 November 2024
  • compromised by such an attack. Pre-computed dictionary attacks, or "rainbow table attacks", can be thwarted by the use of salt, a technique that forces...
    5 KB (591 words) - 22:22, 6 November 2024
  • defend against attacks that use precomputed tables (e.g. rainbow tables), by vastly growing the size of table needed for a successful attack. It also helps...
    13 KB (1,533 words) - 23:19, 23 October 2024
  • The Rainbow Round Table (RRT) of the American Library Association (ALA) is dedicated to supporting the information needs of LGBTQIA+ people, from professional...
    8 KB (831 words) - 17:32, 13 November 2024
  • of North London, UK Rainbow 100, a microcomputer Rainbow storage Rainbow table, a data structure used in password cracking Rainbow, an application using...
    10 KB (1,176 words) - 02:29, 9 December 2024
  • RainbowCrack is a computer program which generates rainbow tables to be used in password cracking. RainbowCrack differs from "conventional" brute force...
    2 KB (126 words) - 20:31, 22 November 2024
  • at USENIX in 1999. Besides incorporating a salt to protect against rainbow table attacks, bcrypt is an adaptive function: over time, the iteration count...
    27 KB (2,851 words) - 04:09, 9 December 2024
  • can send X, look up response Y in the table and get K. This attack can be made practical by using rainbow tables. However, existing NTLMv1 infrastructure...
    29 KB (3,408 words) - 07:41, 9 October 2024
  • logarithms Rainbow tables in cryptography, where the adversary is trying to do better than the exponential time required for a brute-force attack. Rainbow tables...
    5 KB (738 words) - 17:58, 14 October 2024
  • added to the password reduces the ability to use precomputed hashes (rainbow tables) for attacks, and means that multiple passwords have to be tested individually...
    13 KB (1,341 words) - 15:37, 30 May 2024
  • Thumbnail for AirDrop
    Beijing was commissioned to analyze iPhone's encrypted device logs. A rainbow table correlating phone numbers and email accounts was created during investigation...
    24 KB (2,331 words) - 23:29, 29 November 2024
  • pre-computed dictionary attacks, such as a rainbow table, are feasible. In 2003, Ophcrack, an implementation of the rainbow table technique, was published. It specifically...
    19 KB (1,913 words) - 22:18, 15 September 2024
  • Thumbnail for Digest access authentication
    which allows the client to prevent chosen-plaintext attacks, such as rainbow tables that could otherwise threaten digest authentication schemes Server nonce...
    24 KB (2,850 words) - 07:59, 12 November 2024
  • 202, SHA-3 Standard separate from the Secure Hash Standard (SHS). In the table below, internal state means the "internal hash sum" after each compression...
    3 KB (464 words) - 07:05, 4 October 2024
  • Cryptographic hash function Hash function security summary Puzzle friendliness Rainbow table Random oracle RFC 4270: Attacks on Cryptographic Hashes in Internet...
    7 KB (895 words) - 15:44, 13 April 2024
  • Thumbnail for Data Encryption Standard
    algorithm against all except brute-force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length...
    59 KB (6,543 words) - 16:59, 10 November 2024
  • Thumbnail for HMAC
    Collision attack Preimage attack Birthday attack Brute-force attack Rainbow table Side-channel attack Length extension attack Design Avalanche effect...
    18 KB (2,327 words) - 04:57, 18 October 2024
  • Thumbnail for Merkle tree
    Computer programming portal Binary tree Blockchain Distributed hash table Hash table Hash trie Linked timestamping Radix tree Becker, Georg (2008-07-18)...
    15 KB (1,788 words) - 20:42, 10 September 2024
  • string of random characters that modifies the hash to protect against Rainbow table attacks CostFactor (N): Integer CPU/memory cost parameter – Must be...
    17 KB (1,655 words) - 16:23, 7 November 2024
  • Thumbnail for GSM
    project with plans to use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system supports multiple algorithms so operators may replace...
    40 KB (4,576 words) - 01:57, 6 December 2024
  • separately from the password in a discussion of protecting passwords from rainbow table attacks. This usage did not immediately catch on: for example, Fred...
    8 KB (1,045 words) - 20:49, 6 November 2024
  • Thumbnail for Cryptographic hash function
    some attacks, such as building files of precomputing hash values, e.g. rainbow tables. But searches on the order of 100 billion tests per second are possible...
    48 KB (6,237 words) - 18:02, 5 December 2024
  • The Rainbow was a monthly magazine dedicated to the TRS-80 Color Computer, a home computer made by Tandy Corporation (now RadioShack). It was started...
    13 KB (1,451 words) - 21:01, 13 December 2024
  • Thumbnail for Ophcrack
    program that cracks Windows log-in passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety...
    6 KB (451 words) - 12:13, 14 December 2024
  • a database. This effectively increases the difficulty of generating rainbow tables which thus implies that the data stored within each column is less likely...
    27 KB (3,214 words) - 20:59, 25 November 2024
  • Thumbnail for Encryption
    Physical Layer Encryption Pretty Good Privacy Post-quantum cryptography Rainbow table Rotor machine Side-channel attack Substitution cipher Television encryption...
    35 KB (3,687 words) - 18:50, 8 December 2024
  • several new attacks on the SHA-2 family, the best of which are given in the table below. Only the collision attacks are of practical complexity; none of the...
    52 KB (5,014 words) - 00:19, 12 December 2024
  • Thumbnail for Gravatar
    has, however, been shown to be vulnerable to dictionary attacks and rainbow table approaches. In 2009, it was demonstrated that over 10% of the email...
    9 KB (995 words) - 15:30, 3 November 2024
  • Thumbnail for Block cipher mode of operation
    cipher block. The inputs of the listed modes are summarized in the following table: Note: g(i) is any deterministic function, often the identity function....
    52 KB (5,877 words) - 10:16, 19 December 2024
  • Collision attack Preimage attack Birthday attack Brute-force attack Rainbow table Side-channel attack Length extension attack Design Avalanche effect...
    13 KB (1,511 words) - 14:10, 12 October 2024