Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues
暂无分享,去创建一个
The purpose of this case study analysis is to examine a non-traditional method of identifying weak passwords within a large hospital organization. The process of using rainbow tables to crack passwords/ensure password compliance is discussed and specific examples are provided within this paper. This process emphasizes the notion that network security-related problems tend to be organization-specific and require creative approaches. The goal is to establish a practical use for rainbow tables within an organization as a means of enhancing network security.
[1] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[2] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[3] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.