ANALYSIS OF PASSWORD PROTECTED DOCUMENT

Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involve...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Compusoft: an international journal of advanced computer technology 2020-07, Vol.9 (7), p.3762-3767
Hauptverfasser: Narendar, Dharavath, Sriramudu, VenuNalla, Guddeti, Padmavathi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3767
container_issue 7
container_start_page 3762
container_title Compusoft: an international journal of advanced computer technology
container_volume 9
creator Narendar, Dharavath
Sriramudu
VenuNalla
Guddeti, Padmavathi
description Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2437444065</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2437444065</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-f710576742d85ca5499cc6de8b3af37e7cee67de37f200c995e9859b716c54853</originalsourceid><addsrcrecordid>eNotzUFrwjAUwPEwGEyc36Gww06F17y8vORY2jqF2ojNEE9S0_QgYzqr33-Cnv633_9FTCRKSIEtvInZOB4BIENJCNlEfOZNXu_aZZu4ebLO23brNmWy3jhfFb4qk9IV36uq8e_ideh-xjh7dir8vPLFIq3d17LI6_RszTUdOANizUr2hkJHytoQdB_NAbsBOXKIUXMfkQcJEKylaA3ZA2c6kDKEU_HxYM-X098tjtf98XS7_N6Pe6mQlVKgCf8BbLY3Ww</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2437444065</pqid></control><display><type>article</type><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</creator><creatorcontrib>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</creatorcontrib><description>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</description><identifier>EISSN: 2320-0790</identifier><language>eng</language><publisher>Mumbai: COMPUSOFT, An International Journal of Advanced Computer Technology</publisher><subject>Algorithms ; Complexity ; Cryptography ; Data encryption ; Encryption ; Memory ; Operating systems ; Passwords ; Randomness ; Scientific papers</subject><ispartof>Compusoft: an international journal of advanced computer technology, 2020-07, Vol.9 (7), p.3762-3767</ispartof><rights>Copyright COMPUSOFT, An International Journal of Advanced Computer Technology Jul 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Narendar, Dharavath</creatorcontrib><creatorcontrib>Sriramudu</creatorcontrib><creatorcontrib>VenuNalla</creatorcontrib><creatorcontrib>Guddeti, Padmavathi</creatorcontrib><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><title>Compusoft: an international journal of advanced computer technology</title><description>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</description><subject>Algorithms</subject><subject>Complexity</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Memory</subject><subject>Operating systems</subject><subject>Passwords</subject><subject>Randomness</subject><subject>Scientific papers</subject><issn>2320-0790</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotzUFrwjAUwPEwGEyc36Gww06F17y8vORY2jqF2ojNEE9S0_QgYzqr33-Cnv633_9FTCRKSIEtvInZOB4BIENJCNlEfOZNXu_aZZu4ebLO23brNmWy3jhfFb4qk9IV36uq8e_ideh-xjh7dir8vPLFIq3d17LI6_RszTUdOANizUr2hkJHytoQdB_NAbsBOXKIUXMfkQcJEKylaA3ZA2c6kDKEU_HxYM-X098tjtf98XS7_N6Pe6mQlVKgCf8BbLY3Ww</recordid><startdate>20200701</startdate><enddate>20200701</enddate><creator>Narendar, Dharavath</creator><creator>Sriramudu</creator><creator>VenuNalla</creator><creator>Guddeti, Padmavathi</creator><general>COMPUSOFT, An International Journal of Advanced Computer Technology</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20200701</creationdate><title>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</title><author>Narendar, Dharavath ; Sriramudu ; VenuNalla ; Guddeti, Padmavathi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-f710576742d85ca5499cc6de8b3af37e7cee67de37f200c995e9859b716c54853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Complexity</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Memory</topic><topic>Operating systems</topic><topic>Passwords</topic><topic>Randomness</topic><topic>Scientific papers</topic><toplevel>online_resources</toplevel><creatorcontrib>Narendar, Dharavath</creatorcontrib><creatorcontrib>Sriramudu</creatorcontrib><creatorcontrib>VenuNalla</creatorcontrib><creatorcontrib>Guddeti, Padmavathi</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Compusoft: an international journal of advanced computer technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Narendar, Dharavath</au><au>Sriramudu</au><au>VenuNalla</au><au>Guddeti, Padmavathi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ANALYSIS OF PASSWORD PROTECTED DOCUMENT</atitle><jtitle>Compusoft: an international journal of advanced computer technology</jtitle><date>2020-07-01</date><risdate>2020</risdate><volume>9</volume><issue>7</issue><spage>3762</spage><epage>3767</epage><pages>3762-3767</pages><eissn>2320-0790</eissn><abstract>Nowadays, the documents are sent through electronics communications channels like email, WhatsApp, telegram etc., in which the document protection is of major concern. Passwords are used to encrypt the documents of different formats. In this research paper, we analyzed the encryption process involved in word documents (Procedure involved in document protection). We also discussed various password cracking possibilities and steps involved in the attacks including various password cracking tools for analysis of password for doc files and performed salt analysis on the same. We analyzed the randomness of the salt for the same key at different times, with different name and based on the size of the documents. We focused on John the Ripper (JtR) tool with single mode, word list, and incremental mode to reduce the file and memory complexity of brute force attack. We analyzed the randomness of the salt for the same key with same document with different time and the same documents with different name and size. We focused on John the Ripper (JtR) tool for reducing the file and memory complexity of brute force attacks. Also, we've discussed the performance analysis of password cracking based on CPU and GPUs with and without writing the dictionaries.</abstract><cop>Mumbai</cop><pub>COMPUSOFT, An International Journal of Advanced Computer Technology</pub><tpages>6</tpages></addata></record>
fulltext fulltext
identifier EISSN: 2320-0790
ispartof Compusoft: an international journal of advanced computer technology, 2020-07, Vol.9 (7), p.3762-3767
issn 2320-0790
language eng
recordid cdi_proquest_journals_2437444065
source EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Complexity
Cryptography
Data encryption
Encryption
Memory
Operating systems
Passwords
Randomness
Scientific papers
title ANALYSIS OF PASSWORD PROTECTED DOCUMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A08%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ANALYSIS%20OF%20PASSWORD%20PROTECTED%20DOCUMENT&rft.jtitle=Compusoft:%20an%20international%20journal%20of%20advanced%20computer%20technology&rft.au=Narendar,%20Dharavath&rft.date=2020-07-01&rft.volume=9&rft.issue=7&rft.spage=3762&rft.epage=3767&rft.pages=3762-3767&rft.eissn=2320-0790&rft_id=info:doi/&rft_dat=%3Cproquest%3E2437444065%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2437444065&rft_id=info:pmid/&rfr_iscdi=true