SlideShare una empresa de Scribd logo
1 de 8
What is a Rainbow Table ?
A rainbow table is a precomputed table for

reversing cryptographic hash
functions, usually for cracking
password hashes.
Tables are usually used in recovering

a plaintext password up to a certain
length consisting of a limited set of
characters.
It is a practical example of a space/time trade-

off, using more computer processing time at the
cost of less storage when calculating a hash on
every attempt, or less processing time and more

storage when compared to a simple lookup
table with one entry per hash.
Use of a key derivation function that
employs a salt makes this attack infeasible.
Rainbow tables are an application of
an earlier, simpler algorithm

by Martin Hellman
What is a Rainbow Table?

Más contenido relacionado

La actualidad más candente

Buffer Overflows
Buffer OverflowsBuffer Overflows
Buffer Overflows
Sumit Kumar
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
 

La actualidad más candente (20)

Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Left factor put
Left factor putLeft factor put
Left factor put
 
Chacha ppt
Chacha pptChacha ppt
Chacha ppt
 
Not a Security Boundary
Not a Security BoundaryNot a Security Boundary
Not a Security Boundary
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Ettercap
EttercapEttercap
Ettercap
 
Password Management
Password ManagementPassword Management
Password Management
 
DBMS (Deadlock, deadlock prevention, 2phase locking)
DBMS (Deadlock, deadlock prevention, 2phase locking)DBMS (Deadlock, deadlock prevention, 2phase locking)
DBMS (Deadlock, deadlock prevention, 2phase locking)
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Buffer Overflows
Buffer OverflowsBuffer Overflows
Buffer Overflows
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 
SHA-3
SHA-3SHA-3
SHA-3
 
Format String Attack
Format String AttackFormat String Attack
Format String Attack
 

Destacado

Rainbow facts 2
Rainbow facts 2Rainbow facts 2
Rainbow facts 2
twebb101
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-ppt
Rajesh Roky
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
UzmaRuhy
 

Destacado (11)

Rainbow facts 2
Rainbow facts 2Rainbow facts 2
Rainbow facts 2
 
Password Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP ArgentinaPassword Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP Argentina
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-ppt
 
Ophcrack
OphcrackOphcrack
Ophcrack
 
Presentation 3 1 1 1
Presentation 3 1 1 1Presentation 3 1 1 1
Presentation 3 1 1 1
 
Password Cracking with Rainbow Tables
Password Cracking with Rainbow TablesPassword Cracking with Rainbow Tables
Password Cracking with Rainbow Tables
 
Prime Factorization & Fractions
Prime Factorization & FractionsPrime Factorization & Fractions
Prime Factorization & Fractions
 
Rainbow Technology Seminar Report
Rainbow Technology Seminar ReportRainbow Technology Seminar Report
Rainbow Technology Seminar Report
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
 
E ball seminar
E ball seminarE ball seminar
E ball seminar
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
 

Más de Vahid Saffarian

Introduction to RCA connectors
Introduction to RCA connectorsIntroduction to RCA connectors
Introduction to RCA connectors
Vahid Saffarian
 
Computational linguistics
Computational linguisticsComputational linguistics
Computational linguistics
Vahid Saffarian
 
Introduction to AM modulation
Introduction to AM modulationIntroduction to AM modulation
Introduction to AM modulation
Vahid Saffarian
 

Más de Vahid Saffarian (12)

How to grow green pepper
How to grow green pepperHow to grow green pepper
How to grow green pepper
 
What is surrealism ?
What is surrealism ?What is surrealism ?
What is surrealism ?
 
An introduction to Moore's law
An introduction to Moore's lawAn introduction to Moore's law
An introduction to Moore's law
 
Some Latin sayings
Some Latin sayingsSome Latin sayings
Some Latin sayings
 
What is GSM ?
What is GSM ?What is GSM ?
What is GSM ?
 
Introduction to RCA connectors
Introduction to RCA connectorsIntroduction to RCA connectors
Introduction to RCA connectors
 
Introduction to fm modulation
Introduction to fm modulationIntroduction to fm modulation
Introduction to fm modulation
 
What is Happiness?
What is Happiness?What is Happiness?
What is Happiness?
 
Computational linguistics
Computational linguisticsComputational linguistics
Computational linguistics
 
Introduction to AM modulation
Introduction to AM modulationIntroduction to AM modulation
Introduction to AM modulation
 
What is Modulation?
What is Modulation?What is Modulation?
What is Modulation?
 
شکار 2
شکار 2شکار 2
شکار 2
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

What is a Rainbow Table?

  • 1. What is a Rainbow Table ?
  • 2. A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.
  • 3. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.
  • 4. It is a practical example of a space/time trade- off, using more computer processing time at the cost of less storage when calculating a hash on every attempt, or less processing time and more storage when compared to a simple lookup table with one entry per hash.
  • 5.
  • 6. Use of a key derivation function that employs a salt makes this attack infeasible.
  • 7. Rainbow tables are an application of an earlier, simpler algorithm by Martin Hellman