• No results found

brute-force attack

Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish

Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish

... The secure framework is successfully designed to provide security against Brute force attack with Honey encryption. For android based devices it is essentially needed that the messages must be send ...

5

Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

... enforce brute-force attack-resilient ...using brute-force method on a GPU based ...using brute-force methods using a GPU-based ...

5

Comparative Performance of DES and AES in Wireless Security for Brute Force Attack

Comparative Performance of DES and AES in Wireless Security for Brute Force Attack

... strength of an encryption algorithm, the value of the information being protected should be taken into account. It is generally accepted that DES with its 56-bit key will have reached the end of its useful lifetime by ...

6

Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms

Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms

... An attacker can generally find a secret phrase through a brute- force attack, yet the drawback is that it could take a long time to discover it. Contingent upon the secret word's length and ...

6

INVESTIGATIONS IN BRUTE FORCE ATTACK ON GSM BASED ON DES AND AES

INVESTIGATIONS IN BRUTE FORCE ATTACK ON GSM BASED ON DES AND AES

... The algorithms used by GSM based cellular systems for security have a number of inherent weaknesses while dealing with authentication and confidentiality. This paper focuses on the brute force attack ...

5

Analysis Of Default Passwords In Routers Against Brute-Force Attack

Analysis Of Default Passwords In Routers Against Brute-Force Attack

... dictionary attack, rainbow table attack, bulk password attack, and others ...uses brute-force attack technique. Brute force is a computationally intensive technique ...

5

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... Digital signature schemes are mostly used in Cryptography protocols to provide authentication. 512bit SRNN (Short Range Natural Number) algorithm is designed for digital signature. This SRNN algorithm is similar to RSA ...

5

Cracking-Resistant  Password  Vaults  using  Natural  Language  Encoders

Cracking-Resistant Password Vaults using Natural Language Encoders

... The challenge of password-based logins. One encounters an interesting challenge when attempting to build a decoy- based system which supports backup of user vaults: how to authenticate users to the service that is ...

21

The Main Forms of Manifestation of Cybercrimes

The Main Forms of Manifestation of Cybercrimes

... a brute force attack on a server without having access to the server at ...and attack by force against a static password database in Unix, there are free password-breaking programs that ...

7

DETECTING ATTACKS AND PROTECTING FROM SINGLE TO MULTI LEVEL APPLICATION

DETECTING ATTACKS AND PROTECTING FROM SINGLE TO MULTI LEVEL APPLICATION

... a brute force attack may be able to gain access to an account ultimately these attacks can take quite a few hours, days, months, and even years to ...this attack is dependent on how difficult ...

7

A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks

A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks

... Brute force attack is a strategy that can be used against any encrypted data by an attacker who is unable to take advantage of any weakness in an encryption ...a brute force ...

5

135   Password Cracking Techniques [ PUNISHER ] pdf

135 Password Cracking Techniques [ PUNISHER ] pdf

... Rainbow tables are lookup tables that contain almost every possible combination of passwords in a given character set. It is simply a completed brute force attack that you can reuse as many times as ...

48

Dynamic Mobile Token for Web Security using MD5 and One Time Password Method

Dynamic Mobile Token for Web Security using MD5 and One Time Password Method

... logger attack, brute force attack, and other attacks, because the Pass Code is generated in the form of dynamic passwords with salt, such as epoch time and “secret” variables ...

6

Multilayer Graphical Password Authentication

Multilayer Graphical Password Authentication

... Text password are widely used authentication yet. But Text based password are vulnerable in term of security. Another more secure ways of authentication as compare to text base password is graphical password. But ...

5

Brute Force   Cracking the Data Encryption Standard pdf

Brute Force Cracking the Data Encryption Standard pdf

... This book is the product of tremendous work by many people. Thanks must go to Peter Trei for suggesting the demonstration of a brute force attack on the Data Encryption Standard and to RSA for ...

283

Hashxplorer A Distributed System for Hash Matching

Hashxplorer A Distributed System for Hash Matching

... A brute force attack can be used to crack hash ...a brute force ...the brute force attack. It supports various attack modes ...

7

Exploiting  an  HMAC-SHA-1  optimization  to  speed  up  PBKDF2

Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2

... Abstract. PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU- intensive operations based on an iterated pseudorandom function (in our case ...

15

Examination  of  a  New  Defense  Mechanism:  Honeywords

Examination of a New Defense Mechanism: Honeywords

... The use of passwords is one of the most common tools during authentication process. In registration process, most of the users chooses weak passwords that can be predicted by a brute-force attack. ...

6

The  Pythia  PRF  Service

The Pythia PRF Service

... Well-resourced enterprises such as Facebook [41] have therefore incorporated remote cryptographic oper- ations to harden password databases. Before a password is stored or verified, it is sent to a PRF service external ...

21

Improved (Pseudo)  Preimage  Attacks  on  Reduced-Round  GOST   and  Grstl-256   and  Studies  on  Several  Truncation  Patterns  for  AES-like  Compression  Functions (Full  Version)

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)

... To the best of our knowledge, there are no preimage attacks on the GOST-256 hash function except for the trivial brute-force attack. One of the crucial reasons that prevent the preimage attack ...

17

Show all 10000 documents...

Related subjects