Server construction
Security Audit - Breaking hash with intelligence
Article REF: TE7725 V1
Server construction
Security Audit - Breaking hash with intelligence

Author : Laurent LEVIER

Publication date: January 10, 2018 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. Server construction

Building a solution to "break" hash doesn't require a lot of financial resources and, what's more, offers the flexibility to spread expenditure over time. However, to make optimal choices, the reader needs to ask himself certain questions from the outset:

  1. Is this a solution built for a one-off audit, which will not need to evolve in the future, or is it the first element of a solution that will require more and more power?

  2. How far should we go in terms of power?

    The power required is based on three elements:

    • the number of hashes to be broken. The more hashes, the longer it takes. The more power you have, the shorter the time;

    • the size of dictionaries and occurrences. An...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details