Home | Looking for something? Sign In | New here? Sign Up | Log out

الأربعاء، 25 مايو 2011

Background of password cracking

/ On : 5:42 ص/ Terimakasih telah menyempatkan waktu untuk berkunjung di BLOG saya yang sederhana ini. Semoga memberikan manfaat meski tidak sebesar yang Anda harapakan. untuk itu, berikanlah kritik, saran dan masukan dengan memberikan komentar. Jika Anda ingin berdiskusi atau memiliki pertanyaan seputar artikel ini, silahkan hubungan saya lebih lanjut via e-mail di brae00@yahoo.com.

Background of Password cracking


Passwords to access computer systems are usually stored, in some form, in a database in order for the system to perform password verification.


password cracking, virus, secret key, hash function


Passwords to access computer systems are usually stored, in some form, in a database in order for the system to perform password verification. To enhance the privacy of passwords, the stored password verification data is generally produced by applying a one-way function to the password, possibly in combination with other available data. For simplicity of this discussion, when the one-way function does not incorporate a secret key, other than the password, we refer to the one way function employed as a hash and its output as a hashed password. Even though functions that create hashed passwords may be cryptographically secure, possession of a hashed password provides a quick way to verify guesses for the password by applying the function to each guess, and comparing the result to the verification data. The most commonly used hash functions can be computed rapidly and the attacker can do this repeatedly with different guesses until a valid match is found, meaning the plaintext password has been recovered.

Th

 



Password Resetter - Reset Your Windows Password In 3 Steps



Recommended For You



0 التعليقات:

إرسال تعليق