Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
Vol 10, No 4: December 2022

Cryptanalysis the SHA-256 Hash Function using Rainbow Tables

Olga Manankova (PhD student, master of technical science)
Mubarak Yakubova (Doctor of Technical Sciences, Academician, Professor)
Alimjan Baikenov (Candidate of technical science, professor)



Article Info

Publish Date
31 Dec 2022

Abstract

The research of the strength of a hashed message is of great importance in modern authentication systems. The hashing process is inextricably linked with the password system, since passwords are usually stored in the system not in clear text, but as hashes. The SHA-256 hash function was chosen to model the attack with rainbow tables. An algorithm for constructing a rainbow table for the SHA-256 hash function in the Java language is proposed. The conditions under which the use of rainbow tables will be effective are determined. This article aims to practically show the process of generating a password and rainbow tables to organize an attack on the SHA-256 hash function. As research shows, rainbow tables can reveal a three-character password in 3 seconds. As the password bit increases, the decryption time increases in direct proportion.

Copyrights © 2022






Journal Info

Abbrev

IJEEI

Publisher

Subject

Computer Science & IT Electrical & Electronics Engineering

Description

Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is a peer reviewed International Journal in English published four issues per year (March, June, September and December). The aim of Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is to publish high-quality ...