ANALYSIS OF PASSWORD PROTECTED DOCUMENT
Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involve...
Gespeichert in:
Veröffentlicht in: | Compusoft: an international journal of advanced computer technology 2020-07, Vol.9 (7), p.3762-3767 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3767 |
---|---|
container_issue | 7 |
container_start_page | 3762 |
container_title | Compusoft: an international journal of advanced computer technology |
container_volume | 9 |
creator | Narendar, Dharavath Sriramudu VenuNalla Guddeti, Padmavathi |
description | Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2437444065</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2437444065</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f710576742d85ca5499cc6de8b3af37e7cee67de37f200c995e9859b716c54853</originalsourceid><addsrcrecordid>eNotzUFrwjAUwPEwGEyc36Gww06F17y8vORY2jqF2ojNEE9S0_QgYzqr33-Cnv633_9FTCRKSIEtvInZOB4BIENJCNlEfOZNXu_aZZu4ebLO23brNmWy3jhfFb4qk9IV36uq8e_ideh-xjh7dir8vPLFIq3d17LI6_RszTUdOANizUr2hkJHytoQdB_NAbsBOXKIUXMfkQcJEKylaA3ZA2c6kDKEU_HxYM-X098tjtf98XS7_N6Pe6mQlVKgCf8BbLY3Ww</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2437444065</pqid></control><display><type>article</type><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</creator><creatorcontrib>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</creatorcontrib><description>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</description><identifier>EISSN: 2320-0790</identifier><language>eng</language><publisher>Mumbai: COMPUSOFT, An International Journal of Advanced Computer Technology</publisher><subject>Algorithms ; Complexity ; Cryptography ; Data encryption ; Encryption ; Memory ; Operating systems ; Passwords ; Randomness ; Scientific papers</subject><ispartof>Compusoft: an international journal of advanced computer technology, 2020-07, Vol.9 (7), p.3762-3767</ispartof><rights>Copyright COMPUSOFT, An International Journal of Advanced Computer Technology Jul 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Narendar, Dharavath</creatorcontrib><creatorcontrib>Sriramudu</creatorcontrib><creatorcontrib>VenuNalla</creatorcontrib><creatorcontrib>Guddeti, Padmavathi</creatorcontrib><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><title>Compusoft: an international journal of advanced computer technology</title><description>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</description><subject>Algorithms</subject><subject>Complexity</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Memory</subject><subject>Operating systems</subject><subject>Passwords</subject><subject>Randomness</subject><subject>Scientific papers</subject><issn>2320-0790</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotzUFrwjAUwPEwGEyc36Gww06F17y8vORY2jqF2ojNEE9S0_QgYzqr33-Cnv633_9FTCRKSIEtvInZOB4BIENJCNlEfOZNXu_aZZu4ebLO23brNmWy3jhfFb4qk9IV36uq8e_ideh-xjh7dir8vPLFIq3d17LI6_RszTUdOANizUr2hkJHytoQdB_NAbsBOXKIUXMfkQcJEKylaA3ZA2c6kDKEU_HxYM-X098tjtf98XS7_N6Pe6mQlVKgCf8BbLY3Ww</recordid><startdate>20200701</startdate><enddate>20200701</enddate><creator>Narendar, Dharavath</creator><creator>Sriramudu</creator><creator>VenuNalla</creator><creator>Guddeti, Padmavathi</creator><general>COMPUSOFT, An International Journal of Advanced Computer Technology</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20200701</creationdate><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><author>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f710576742d85ca5499cc6de8b3af37e7cee67de37f200c995e9859b716c54853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Complexity</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Memory</topic><topic>Operating systems</topic><topic>Passwords</topic><topic>Randomness</topic><topic>Scientific papers</topic><toplevel>online_resources</toplevel><creatorcontrib>Narendar, Dharavath</creatorcontrib><creatorcontrib>Sriramudu</creatorcontrib><creatorcontrib>VenuNalla</creatorcontrib><creatorcontrib>Guddeti, Padmavathi</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Compusoft: an international journal of advanced computer technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Narendar, Dharavath</au><au>Sriramudu</au><au>VenuNalla</au><au>Guddeti, Padmavathi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</atitle><jtitle>Compusoft: an international journal of advanced computer technology</jtitle><date>2020-07-01</date><risdate>2020</risdate><volume>9</volume><issue>7</issue><spage>3762</spage><epage>3767</epage><pages>3762-3767</pages><eissn>2320-0790</eissn><abstract>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</abstract><cop>Mumbai</cop><pub>COMPUSOFT, An International Journal of Advanced Computer Technology</pub><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2320-0790 |
ispartof | Compusoft: an international journal of advanced computer technology, 2020-07, Vol.9 (7), p.3762-3767 |
issn | 2320-0790 |
language | eng |
recordid | cdi_proquest_journals_2437444065 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Complexity Cryptography Data encryption Encryption Memory Operating systems Passwords Randomness Scientific papers |
title | ANALYSIS OF PASSWORD PROTECTED DOCUMENT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A08%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ANALYSIS%20OF%20PASSWORD%20PROTECTED%20DOCUMENT&rft.jtitle=Compusoft:%20an%20international%20journal%20of%20advanced%20computer%20technology&rft.au=Narendar,%20Dharavath&rft.date=2020-07-01&rft.volume=9&rft.issue=7&rft.spage=3762&rft.epage=3767&rft.pages=3762-3767&rft.eissn=2320-0790&rft_id=info:doi/&rft_dat=%3Cproquest%3E2437444065%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2437444065&rft_id=info:pmid/&rfr_iscdi=true |