Abstract
In this paper, we show a method of exhaustive search on a password system that uses SHA-1 iteratively. Our method uses both the technique shown in Steube [16] and a technique for computing repetitions of SHA-1. Combining these two techniques reduces the total number of operations. We also show how to apply our method to MS Office (Microsoft Office) 2007/2010.




Similar content being viewed by others
References
ECMA: ECMA-376: Office Open XML File Formats. ECMA (2012)
Elcomsoft. http://www.elcomsoft.com/aopr.html
Gaithersburg: FIPS PUB 180-4 Secure Hash Standard (SHS). NIST (2012)
ISO/IEC: ISO/IEC 10646: Information technology—Universal Coded Character Set (UCS). ISO/IEC (2014)
Karn, P., Simpson, W.A., Metzger, P.: The ESP triple DES transform. RFC Editor, RFC 1851 (1995)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, Boca Raton (2007)
Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search. In: Advances in Cryptology CRYPTO 96, Lecture Notes in Computer Science, vol. 1109, pp. 252–267 (1996)
Microsoft: Compound File Binary File. Microsoft Corporation (2010)
Microsoft: Microsoft Office File Format Documentation Introduction. Microsoft Corporation (2011)
Microsoft: [MS-OFFCRYPTO]: Office Document Cryptography Structure Specification. Microsoft Corporation (2012)
NIST: FIPS-197: Advanced Encryption Standard. NIST (2001)
National Bureau of Standards: Data Encryption Standard. U.S. Department of Commerce. FIPS pub. 46 (1977)
Passware. http://www.lostpassword.com/hardware-acceleration.htm
Rivest, R.: A description of the RC2 (r) encryption algorithm. RFC editor, RFC 2268 (1998)
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Steube, J.: Exploiting a sha1 weakness in password cracking. In: Passwords \(\hat{}\,12\)(2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, M., Jung, Y. & Song, J. A modified exhaustive search on a password system using SHA-1. Int. J. Inf. Secur. 16, 263–269 (2017). https://doi.org/10.1007/s10207-016-0332-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-016-0332-2