30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

length and is nonsensical <strong>in</strong> nature. It is derived from the orig<strong>in</strong>al password by<br />

pass<strong>in</strong>g it through a one-way hash function (Raval & Fichadia, 2007).<br />

A one-way hash function can derive the password hash by us<strong>in</strong>g the<br />

password as a value for the function. However, after the hash is calculated, it is<br />

impossible for the function to be reversed to derive the orig<strong>in</strong>al password from the<br />

password hash. Also, the one-way hash function is designed to be ‗collision-free‘,<br />

such that different passwords generate different hash values (Raval & Fichadia,<br />

2007). In order for authentication to take place, the user enters his or her password,<br />

which is passed through the one-way hash function. If the output generated<br />

matches the stored hash value, then the user is allowed access. This mechanism is<br />

demonstrated <strong>in</strong> Figure 2.1.<br />

Some operat<strong>in</strong>g systems generate the password hash by pass<strong>in</strong>g the<br />

password along with an additional value called a ‗salt‘ through the hash function<br />

to <strong>in</strong>crease randomness. Thus, a ‗salt‘ is a short, random str<strong>in</strong>g of characters that<br />

is appended to the password to <strong>in</strong>crease security (Salomon, 2006). One of the<br />

most common values used as a salt is the username (Raval & Fichadia, 2007).<br />

―world‖<br />

(wrong password)<br />

Generate Hash Password Hash<br />

Store<br />

653DAF!%$!!A1$413 1$%!#15769AAFDS!#$<br />

No<br />

Do<br />

hashes<br />

match? Yes<br />

Access Denied Access Granted<br />

Figure 2.1: Password hash<strong>in</strong>g and verification (Raval & Fichadia, 2007, p. 180)<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!