SlideShare a Scribd company logo
1 of 16
Implementation of rainbow tables
to crack MD5 codes
Presented by: BOUKREDIMI Khadidja
2015/2016
20/04/2016 Information Security 2
Outlines
1. Introduction to Hash functions
2. Message Digest 5 (MD5)
3. Applications
4. MD5 collision
5. Implementation of MD5 in Java
6. Attacks on MD5
7. Rainbow tables
8. How rainbow tables work?
9. Conclusion
20/04/2016 Information Security 3
Introduction to Hash functions
Hash functions are third type of cryptography.
Hash  functions  generate  short­length  strings  from 
arbitrary length input message.
20/04/2016 Information Security 4
Introduction to Hash functions
Hash functions have three fundamental properties:
It must be able to easily convert digital information 
(message) into a fixed length value.
It must be computationally impossible to find two 
files to have the same hash.
It must be computationally impossible to derive any 
information about the input message from just the 
hash.
Note:  the  main  difference  between  hashing  and 
encryption is that a hash is not reversible.
20/04/2016 Information Security 5
Message Digest 5 (MD5)
MD5 is a hash function that was developed in 1991 
by Ronald Rivest.
MD5  produces  a  128­bit  (16  byte)  hash  value, 
typically  expressed  in  text  format  as  a  32  digit 
hexadecimal number.
20/04/2016 Information Security 6
Applications
MD5  is  used  to  verify  file  integrity  and  to  encrypt 
passwords
Verification of file integrity
File  servers  often  provide  a  pre­computed  MD5       
checksum  for  the  file,  so  the  user  can  compare  the 
checksum of the downloaded file to it.
20/04/2016 Information Security 7
Applications
Passwords encryption
A more secure way is to store a 
hash  of  the  password,  rather 
than the password itself.
20/04/2016 Information Security 8
MD5 collision
A collision is when there are two files with the same 
hash.  The  first  practical  collisions  on  MD5  were  in 
2004 by Wang, Feng, Lai and Yu.
20/04/2016 Information Security 9
Implementation of MD5 in Java
20/04/2016 Information Security 10
Attacks on MD5
Rainbow tables
A  rainbow  table  is  a  pre­computed  tables  for 
reversing cryptographic hash functions.
A  rainbow  table  makes  brute  forcing  a  password 
hash  much  easier,  by  removing  the  most 
computationally complicated part of a brute force.
The values are already computed, it's simplified to 
just a simple search­and­compare operation on the 
table.
20/04/2016 Information Security 11
How rainbow tables work?
Rainbow tables use reduction and hash functions.
A  hash  function  maps  plaintexts  to  hashes,  the 
reduction function maps hashes to plaintexts.
There are two methods to find a given plaintext:
Hash  each  plaintext  one  by  one,  until  we  find  the 
hash
Hash  each  plaintext  one  by  one,  but  store  each 
generated hash in a stored table so that we can easily 
look the hash up later without generating the hashes 
again.
20/04/2016 Information Security 12
How rainbow tables work?
20/04/2016 Information Security 13
Conclusion
Password  storage  is  one  important  aspect  of  data 
security.
MD5  is  used  for  encrypting  plaintext  passwords  into 
strings  that  theoretically  can't  be  deciphered  due  to 
their one­way encryption feature.
Rainbow  tables  are  the  new  generation  of  cracking, 
using advanced method for cracking passwords.
There were improvement on MD5 processing by adding 
salt  value,  which  makes  passwords  more  resistant  to 
rainbow tables.
20/04/2016 Information Security 14
References
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu. 
Collisions for Hash Functions MD4, MD5, HAVAL­128 and 
RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004. 
http://eprint.iacr.org/.
Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other
Hash Functions. In Ronald Cramer, editor, Advances in 
Cryptology­EUROCRYPT 2005, volume 3494 of Lecture Notes 
in Computer Science, pages 19–35. Springer, 2005.
Rivest, R., The MD4 Message Digest Algorithm, RFC 1320, 
MIT and RSA Data Security, Inc., April 1992.
20/04/2016 Information Security 15
References
Mary Cindy Ah Kioon, Zhao Shun Wang and Shubra Deb Das.
Security Analysis of MD5 algorithm in Password Storage, 2013, 
pages 4.
Praveen Gauravaram, Adrian McCullagh and ED Dawson. 
Collision Attacks on MD5 and SHA­1: Is this the “Sword of 
Damocles” for Electronic Commerce?, 2006, pages 73­88.
WarpBoy. Rainbow tables explained, 2006, pages 11.
source URL: https://en.wikipedia.org/wiki/Rainbow_table, 
April 16 th , 2016, visited 18/04/2016.
Questions

More Related Content

What's hot

Microfinance in Bangladesh: Red and Green Lights
Microfinance in Bangladesh: Red and Green LightsMicrofinance in Bangladesh: Red and Green Lights
Microfinance in Bangladesh: Red and Green LightsS Badruddoza
 
Comparative study of mutual funds in india
Comparative study of mutual funds in india Comparative study of mutual funds in india
Comparative study of mutual funds in india Rahul Todur
 
Rahul Gupta MBA Finance IVth SEMESTER Project
Rahul Gupta MBA Finance IVth SEMESTER ProjectRahul Gupta MBA Finance IVth SEMESTER Project
Rahul Gupta MBA Finance IVth SEMESTER ProjectRahul Gupta
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
Project on Mutual Funds
Project on  Mutual FundsProject on  Mutual Funds
Project on Mutual FundsRavindra Jeet
 
Micro, small and medium enterprises in india
Micro, small and medium enterprises in indiaMicro, small and medium enterprises in india
Micro, small and medium enterprises in indiaRaveena Kaushal
 
Ransomware
RansomwareRansomware
RansomwareG Prachi
 
Microfinance Performance in SHG Project Report
Microfinance Performance in SHG Project ReportMicrofinance Performance in SHG Project Report
Microfinance Performance in SHG Project ReportDinu05
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Hassan EL ALLOUSSI
 

What's hot (12)

Microfinance in Bangladesh: Red and Green Lights
Microfinance in Bangladesh: Red and Green LightsMicrofinance in Bangladesh: Red and Green Lights
Microfinance in Bangladesh: Red and Green Lights
 
Comparative study of mutual funds in india
Comparative study of mutual funds in india Comparative study of mutual funds in india
Comparative study of mutual funds in india
 
Rahul Gupta MBA Finance IVth SEMESTER Project
Rahul Gupta MBA Finance IVth SEMESTER ProjectRahul Gupta MBA Finance IVth SEMESTER Project
Rahul Gupta MBA Finance IVth SEMESTER Project
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Project on Mutual Funds
Project on  Mutual FundsProject on  Mutual Funds
Project on Mutual Funds
 
Micro, small and medium enterprises in india
Micro, small and medium enterprises in indiaMicro, small and medium enterprises in india
Micro, small and medium enterprises in india
 
Microfinance in India
Microfinance in IndiaMicrofinance in India
Microfinance in India
 
Ransomware
RansomwareRansomware
Ransomware
 
Microfinance Performance in SHG Project Report
Microfinance Performance in SHG Project ReportMicrofinance Performance in SHG Project Report
Microfinance Performance in SHG Project Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 

Viewers also liked

Cursuri autorizate managementul documentelor
Cursuri autorizate managementul documentelorCursuri autorizate managementul documentelor
Cursuri autorizate managementul documentelorValentina Nistor
 
My slideshare showcase
My slideshare showcaseMy slideshare showcase
My slideshare showcaseYinaa
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesKhadidja BOUKREDIMI
 
JCP PR Campaign Proposal
JCP PR Campaign ProposalJCP PR Campaign Proposal
JCP PR Campaign ProposalMaria Garner
 
The Hunger Games: Catching Fire PR Campaign Proposal
The Hunger Games: Catching Fire PR Campaign ProposalThe Hunger Games: Catching Fire PR Campaign Proposal
The Hunger Games: Catching Fire PR Campaign ProposalMaria Garner
 

Viewers also liked (9)

Showcase
ShowcaseShowcase
Showcase
 
Cursuri autorizate managementul documentelor
Cursuri autorizate managementul documentelorCursuri autorizate managementul documentelor
Cursuri autorizate managementul documentelor
 
My slideshare showcase
My slideshare showcaseMy slideshare showcase
My slideshare showcase
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codes
 
Showcase
ShowcaseShowcase
Showcase
 
JCP PR Campaign Proposal
JCP PR Campaign ProposalJCP PR Campaign Proposal
JCP PR Campaign Proposal
 
Showcase
ShowcaseShowcase
Showcase
 
SHHS PR Proposal
SHHS PR ProposalSHHS PR Proposal
SHHS PR Proposal
 
The Hunger Games: Catching Fire PR Campaign Proposal
The Hunger Games: Catching Fire PR Campaign ProposalThe Hunger Games: Catching Fire PR Campaign Proposal
The Hunger Games: Catching Fire PR Campaign Proposal
 

Similar to implementation of rainbow tables to crack md5 codes

Similar to implementation of rainbow tables to crack md5 codes (20)

Message digest 5
Message digest 5Message digest 5
Message digest 5
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
 
Mj2521372142
Mj2521372142Mj2521372142
Mj2521372142
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Md5
Md5Md5
Md5
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
 

Recently uploaded

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

implementation of rainbow tables to crack md5 codes

  • 1. Implementation of rainbow tables to crack MD5 codes Presented by: BOUKREDIMI Khadidja 2015/2016
  • 2. 20/04/2016 Information Security 2 Outlines 1. Introduction to Hash functions 2. Message Digest 5 (MD5) 3. Applications 4. MD5 collision 5. Implementation of MD5 in Java 6. Attacks on MD5 7. Rainbow tables 8. How rainbow tables work? 9. Conclusion
  • 3. 20/04/2016 Information Security 3 Introduction to Hash functions Hash functions are third type of cryptography. Hash  functions  generate  short­length  strings  from  arbitrary length input message.
  • 4. 20/04/2016 Information Security 4 Introduction to Hash functions Hash functions have three fundamental properties: It must be able to easily convert digital information  (message) into a fixed length value. It must be computationally impossible to find two  files to have the same hash. It must be computationally impossible to derive any  information about the input message from just the  hash. Note:  the  main  difference  between  hashing  and  encryption is that a hash is not reversible.
  • 5. 20/04/2016 Information Security 5 Message Digest 5 (MD5) MD5 is a hash function that was developed in 1991  by Ronald Rivest. MD5  produces  a  128­bit  (16  byte)  hash  value,  typically  expressed  in  text  format  as  a  32  digit  hexadecimal number.
  • 6. 20/04/2016 Information Security 6 Applications MD5  is  used  to  verify  file  integrity  and  to  encrypt  passwords Verification of file integrity File  servers  often  provide  a  pre­computed  MD5        checksum  for  the  file,  so  the  user  can  compare  the  checksum of the downloaded file to it.
  • 7. 20/04/2016 Information Security 7 Applications Passwords encryption A more secure way is to store a  hash  of  the  password,  rather  than the password itself.
  • 8. 20/04/2016 Information Security 8 MD5 collision A collision is when there are two files with the same  hash.  The  first  practical  collisions  on  MD5  were  in  2004 by Wang, Feng, Lai and Yu.
  • 9. 20/04/2016 Information Security 9 Implementation of MD5 in Java
  • 10. 20/04/2016 Information Security 10 Attacks on MD5 Rainbow tables A  rainbow  table  is  a  pre­computed  tables  for  reversing cryptographic hash functions. A  rainbow  table  makes  brute  forcing  a  password  hash  much  easier,  by  removing  the  most  computationally complicated part of a brute force. The values are already computed, it's simplified to  just a simple search­and­compare operation on the  table.
  • 11. 20/04/2016 Information Security 11 How rainbow tables work? Rainbow tables use reduction and hash functions. A  hash  function  maps  plaintexts  to  hashes,  the  reduction function maps hashes to plaintexts. There are two methods to find a given plaintext: Hash  each  plaintext  one  by  one,  until  we  find  the  hash Hash  each  plaintext  one  by  one,  but  store  each  generated hash in a stored table so that we can easily  look the hash up later without generating the hashes  again.
  • 12. 20/04/2016 Information Security 12 How rainbow tables work?
  • 13. 20/04/2016 Information Security 13 Conclusion Password  storage  is  one  important  aspect  of  data  security. MD5  is  used  for  encrypting  plaintext  passwords  into  strings  that  theoretically  can't  be  deciphered  due  to  their one­way encryption feature. Rainbow  tables  are  the  new  generation  of  cracking,  using advanced method for cracking passwords. There were improvement on MD5 processing by adding  salt  value,  which  makes  passwords  more  resistant  to  rainbow tables.
  • 14. 20/04/2016 Information Security 14 References Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu.  Collisions for Hash Functions MD4, MD5, HAVAL­128 and  RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004.  http://eprint.iacr.org/. Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. In Ronald Cramer, editor, Advances in  Cryptology­EUROCRYPT 2005, volume 3494 of Lecture Notes  in Computer Science, pages 19–35. Springer, 2005. Rivest, R., The MD4 Message Digest Algorithm, RFC 1320,  MIT and RSA Data Security, Inc., April 1992.
  • 15. 20/04/2016 Information Security 15 References Mary Cindy Ah Kioon, Zhao Shun Wang and Shubra Deb Das. Security Analysis of MD5 algorithm in Password Storage, 2013,  pages 4. Praveen Gauravaram, Adrian McCullagh and ED Dawson.  Collision Attacks on MD5 and SHA­1: Is this the “Sword of  Damocles” for Electronic Commerce?, 2006, pages 73­88. WarpBoy. Rainbow tables explained, 2006, pages 11. source URL: https://en.wikipedia.org/wiki/Rainbow_table,  April 16 th , 2016, visited 18/04/2016.