1. "Break password
First of all, "password breaking" is an ugly expression, but it's not without significance. It comes from the English expression "password breaking".
Conceptually, the password-breaking technique is fairly simplistic: we start with the "hashed" version of the password, for which we know the cryptographic algorithm and a complementary seed (salt, seed).
Once a password has been chosen by a user, it is encoded by a cryptographic algorithm to produce a hash. A hash is an incomprehensible "text" representing the encoded word. This algorithm (generally) only works in one direction, i.e. it is not possible to find the original word by decoding the hash obtained. This is known as a "hashed password". Depending on the application used, a secret element may be added when calculating the hash. It is then known only...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
"Break password
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - MUJTABA (H.) - NVIDIA Pascal GP100 GPU Benchmarks Unveiled – Tesla P100 Is The Fastest Graphics Card Ever Created For Hyperscale Computing. - Wccftech (2016). http://wccftech.com/nvidia-gp100-gpu-tesla-p100-benchmarks/
Also...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!