Choisir une image pour le header de haut de page

   PRODUITS     Déchiffrement     Rainbow Tables

RAINBOW TABLES

Rainbow tables are pre-computed, brute-force attacks. In cryptography, a brute-force attack is an attempt to recover a cryptographic key or password by trying every possible combination until the correct one is found. How quickly this can be done depends on the size of the key, and the computing resources applied.

A system set at 40-bit encryption has one trillion keys available. A brute-force attack of 500,000 keys per second would take approximately 25 days to exhaust the key space combinations using a single 3 Ghz Pentium 4 computer. With a Rainbow Table, you can decrypt 40-bit encrypted files in seconds or minutes rather than days or weeks.

Included in the Bundle:

MS Office MS Office 97 and 2000 derive a 40-bit encryption key from a user-supplied password. Our rainbow tables recover that 40-bit key in typically less than one minute. Once the key has been recovered, the document can be decrypted. Adobe PDF Older PDF versions derive a 40-bit key from the user supplied password. Our rainbow tables recover that key, usually in less than a minute. Once the key has been recovered, the document can be decrypted. Again, the key, not the password, is recovered.