Security: パスワードの90%がやぶられる? ver. 2





20 Hours, $18, and 11 Million Passwords Cracked


II.Brief Background: Storing Passwords


ユーザーがパスワードをいれたとき、パスワードのリストと付き合わせるのではなく、hash tableでチェックします。

Hash tableは、hash関数によって算出されたhashコードの表です。

つまり、任意の長さのパスワードを、hash関数によって一律の長さのコードに変換した一覧がhash tableです。





The In’s and Out’s of Cryptographic Hash Functions




Property 1: Deterministic




Property 2: Quick Computation




Property 3: Pre-Image Resistance






About shibatau

I was born and grown up in Kyoto. I studied western philosophy at the University and specialized in analytic philosophy, especially Ludwig Wittgenstein at the postgraduate school. I'm interested in new technology, especially machine learning and have been learning R language for two years and began to learn Python last summer. Listening toParamore, Sia, Amazarashi and MIyuki Nakajima. Favorite movies I've recently seen: "FREEHELD". Favorite actors and actresses: Anthony Hopkins, Denzel Washington, Ellen Page, Meryl Streep, Mia Wasikowska and Robert DeNiro. Favorite books: Fyodor Mikhailovich Dostoyevsky, "The Karamazov Brothers", Shinran, "Lamentations of Divergences". Favorite phrase: Salvation by Faith. Twitter: @shibatau

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.