Unicrypt: A Constructive Approach Towards Rainbow Table Vulnerability

Authors

  • Mohit Dagar Student, Computer Science Department, G.B Pant Govt. Engineering College, Okhla, Delhi
  • Nandit Saini Student, Computer Science Department, G.B Pant Govt. Engineering College, Okhla, Delhi
  • Ashish Sankla Assistant Professor, Computer Science Department, G.B Pant Govt. Engineering College, Okhla, Delhi
  • Himanshu Naresh Student, Computer Science Department, G.B Pant Govt. Engineering College, Okhla, Delhi

DOI:

https://doi.org/10.53555/nnas.v2i5.678

Keywords:

Cryptography, unicrypt, brute force attack, LM, NTLM, rainbow tables, dictionary attack

Abstract

This project shows how we can eliminate the threat of password cracking by rainbow table. In this project we had made an encipher which encrypts our message or password in such a way that it becomes impossible to make a complete rainbow table for it which thus protects us from rainbow table attack used by professional hackers to crack the password. The encipher encrypts our message such that a different hash value is created every time, even if you encrypt the same message more than one time.

References

. G. Zorn, S. Cobb, "Microsoft LM: Microsoft PPP CHAP Extensions" Microsoft Corporation, October 1998.

. Eric Glass, “The NTLM Authentication Protocol and Security Support Provider", 2006.

. Joseph Bonneau, “Guessing human-chosen secrets” University of Cambridge, Technical Report Number - 819, p. 11,May 2012.

. Meetika Malhotra, Bhushan Dua,” A Review of NTLM Rainbow Table Generation Techniques” Publisher: Global Journals Inc. (USA), Volume 13 Issue 7 Version 1.0 Year 2013, Online ISSN: 0975-4172 & Print ISSN:0975-4350.

.William Stallings. 2010. Cryptography and Network Security: Principles and Practice (5th Ed.). Prentice Hall Press, Upper Saddle River, NJ, USA.

. Sombir Singh, Sunil K. Maakar, Dr.Sudesh Kumar ,“Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, Volume 3, Issue 6, June 2013 ISSN: 2277 128X.

. Jørgen Blakstad , Rune Walsø Nergård , Martin Gilje Jaatun , Danilo Gligoroski ,“All in a day's work:Password cracking for the rest of us”, Presented at the NISK-2009 conference.

. Mudassar Raza, Muhammad Iqbal, Muhammad Sharif and Waqas Haider,” A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication”, World Applied Sciences Journal 19 (4): 439-444, 2012 ISSN 1818-4952.

Downloads

Published

2015-05-31

How to Cite

Dagar, M., Saini, N., Sankla, A., & Naresh, H. (2015). Unicrypt: A Constructive Approach Towards Rainbow Table Vulnerability. Journal of Advance Research in Applied Science (ISSN 2208-2352), 2(5), 01-10. https://doi.org/10.53555/nnas.v2i5.678