WindowsNT/2k密碼到雜湊的實現演算法(轉)
WindowsNT/2k密碼到雜湊的實現演算法(轉)[@more@] NT/2000的密碼雜湊也叫OWF,其實這個雜湊的作用很大,任何密碼都會先生成雜湊進行儲存,在網路認證的時候,也會使用雜湊。 但是關於NT/2000的密碼雜湊雖然有很多的介紹,但是卻缺乏具體的演算法,影響了對於其演算法安全性的研究,這裡就是透過反彙編獲得的密碼到雜湊的實現。 NT/2000的密碼雜湊其實由2部分組成,一部分是透過變形DES演算法,使用密碼的大寫OEM格式作為金鑰(分成2個KEY,每個KEY7位元組,用0補足14個位元組),透過DESECB方式獲得一個128位的金鑰,加密特殊字串“KGS!@#$%”獲得的一個16位元組長度的值。另一部分則是使用MD4對密碼的UNICODE形式進行加密獲得的一個雜湊,下面就是具體的演算法程式碼,提供給大家做進一步深入的研究: //注:DES的演算法與標準DES的演算法有如下不同 //與標準DES的SPBOX不同 //與標準DES的ECB生成演算法不同,DESKEY不同,標準的是生成64位位元組,而他是生成128位位元組 //標準的DES一次是8位元組塊加密8位元組再迴圈,而他是16位元組一次 //關於MD4的實現,我這裡沒有標準MD4的演算法實現和說明,但是有MD5的,按照MD4與MD5的區別中,好象演算法還是有很多改變。 //因為按照標準的MD5的說法,每輪當中的每次計算,除了引數不同,函式演算法是一致的,但其實他的實現是不同的。 void passtoowf(wchar_t * password); void initLMP(char * pass,unsigned char * LM); void deskey(char * LmPass,unsigned char * desecb); void des(unsigned char * LM,char * magic,unsigned char * ecb,long no); void md4init(unsigned char * LM); void md4(unsigned char * LM); void initMDP(PLSA_UNICODE_STRING pass,unsigned char * LM); typedef DWORD (CALLBACK* RTLUPCASEUNICODESTRINGTOOEMSTRING)(PLSA_UNICODE_STRING, PLSA_UNICODE_STRING, DWORD); RTLUPCASEUNICODESTRINGTOOEMSTRING RtlUpcaseUnicodeStringToOemString; unsigned char DESParity[]={0,1,1,2,1,2,2,3,1,2,2,3,2,3,3,4}; unsigned char DESDShift[]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0, 0x64,0xCC,0xF9,0x29,0xDF,0xDE,0x86,0x4A,0x81,0x84,9,0x3C,0,0,0,0, 0xFB,0x99,0xE9,8,0xEC,0x87,0x67,0x2F,0x59,0x0FD,0x22,0xF1}; DWORD DESKEY1[]={ 0x00000000,0x00000010,0x20000000,0x20000010,0x00010000,0x00010010,0x20010000,0x20010010, 0x00000800,0x00000810,0x20000800,0x20000810,0x00010800,0x00010810,0x20010800,0x20010810, 0x00000020,0x00000030,0x20000020,0x20000030,0x00010020,0x00010030,0x20010020,0x20010030, 0x00000820,0x00000830,0x20000820,0x20000830,0x00010820,0x00010830,0x20010820,0x20010830, 0x00080000,0x00080010,0x20080000,0x20080010,0x00090000,0x00090010,0x20090000,0x20090010, 0x00080800,0x00080810,0x20080800,0x20080810,0x00090800,0x00090810,0x20090800,0x20090810, 0x00080020,0x00080030,0x20080020,0x20080030,0x00090020,0x00090030,0x20090020,0x20090030, 0x00080820,0x00080830,0x20080820,0x20080830,0x00090820,0x00090830,0x20090820,0x20090830}; DWORD DESKEY2[]={ 0x00000000,0x02000000,0x00002000,0x02002000,0x00200000,0x02200000,0x00202000,0x02202000, 0x00000004,0x02000004,0x00002004,0x02002004,0x00200004,0x02200004,0x00202004,0x02202004, 0x00000400,0x02000400,0x00002400,0x02002400,0x00200400,0x02200400,0x00202400,0x02202400, 0x00000404,0x02000404,0x00002404,0x02002404,0x00200404,0x02200404,0x00202404,0x02202404, 0x10000000,0x12000000,0x10002000,0x12002000,0x10200000,0x12200000,0x10202000,0x12202000, 0x10000004,0x12000004,0x10002004,0x12002004,0x10200004,0x12200004,0x10202004,0x12202004, 0x10000400,0x12000400,0x10002400,0x12002400,0x10200400,0x12200400,0x10202400,0x12202400, 0x10000404,0x12000404,0x10002404,0x12002404,0x10200404,0x12200404,0x10202404,0x12202404}; DWORD DESKEY3[]={ 0x00000000,0x00000001,0x00040000,0x00040001,0x01000000,0x01000001,0x01040000,0x01040001, 0x00000002,0x00000003,0x00040002,0x00040003,0x01000002,0x01000003,0x01040002,0x01040003, 0x00000200,0x00000201,0x00040200,0x00040201,0x01000200,0x01000201,0x01040200,0x01040201, 0x00000202,0x00000203,0x00040202,0x00040203,0x01000202,0x01000203,0x01040202,0x01040203, 0x08000000,0x08000001,0x08040000,0x08040001,0x09000000,0x09000001,0x09040000,0x09040001, 0x08000002,0x08000003,0x08040002,0x08040003,0x09000002,0x09000003,0x09040002,0x09040003, 0x08000200,0x08000201,0x08040200,0x08040201,0x09000200,0x09000201,0x09040200,0x09040201, 0x08000202,0x08000203,0x08040202,0x08040203,0x09000202,0x09000203,0x09040202,0x09040203}; DWORD DESKEY4[]={ 0x00000000,0x00100000,0x00000100,0x00100100,0x00000008,0x00100008,0x00000108,0x00100108, 0x00001000,0x00101000,0x00001100,0x00101100,0x00001008,0x00101008,0x00001108,0x00101108, 0x04000000,0x04100000,0x04000100,0x04100100,0x04000008,0x04100008,0x04000108,0x04100108, 0x04001000,0x04101000,0x04001100,0x04101100,0x04001008,0x04101008,0x04001108,0x04101108, 0x00020000,0x00120000,0x00020100,0x00120100,0x00020008,0x00120008,0x00020108,0x00120108, 0x00021000,0x00121000,0x00021100,0x00121100,0x00021008,0x00121008,0x00021108,0x00121108, 0x04020000,0x04120000,0x04020100,0x04120100,0x04020008,0x04120008,0x04020108,0x04120108, 0x04021000,0x04121000,0x04021100,0x04121100,0x04021008,0x04121008,0x04021108,0x04121108}; DWORD DESKEY5[]={ 0x00000000,0x10000000,0x00010000,0x10010000,0x00000004,0x10000004,0x00010004,0x10010004, 0x20000000,0x30000000,0x20010000,0x30010000,0x20000004,0x30000004,0x20010004,0x30010004, 0x00100000,0x10100000,0x00110000,0x10110000,0x00100004,0x10100004,0x00110004,0x10110004, 0x20100000,0x30100000,0x20110000,0x30110000,0x20100004,0x30100004,0x20110004,0x30110004, 0x00001000,0x10001000,0x00011000,0x10011000,0x00001004,0x10001004,0x00011004,0x10011004, 0x20001000,0x30001000,0x20011000,0x30011000,0x20001004,0x30001004,0x20011004,0x30011004, 0x00101000,0x10101000,0x00111000,0x10111000,0x00101004,0x10101004,0x00111004,0x10111004, 0x20101000,0x30101000,0x20111000,0x30111000,0x20101004,0x30101004,0x20111004,0x30111004}; DWORD DESKEY6[]={ 0x00000000,0x08000000,0x00000008,0x08000008,0x00000400,0x08000400,0x00000408,0x08000408, 0x00020000,0x08020000,0x00020008,0x08020008,0x00020400,0x08020400,0x00020408,0x08020408, 0x00000001,0x08000001,0x00000009,0x08000009,0x00000401,0x08000401,0x00000409,0x08000409, 0x00020001,0x08020001,0x00020009,0x08020009,0x00020401,0x08020401,0x00020409,0x08020409, 0x02000000,0x0A000000,0x02000008,0x0A000008,0x02000400,0x0A000400,0x02000408,0x0A000408, 0x02020000,0x0A020000,0x02020008,0x0A020008,0x02020400,0x0A020400,0x02020408,0x0A020408, 0x02000001,0x0A000001,0x02000009,0x0A000009,0x02000401,0x0A000401,0x02000409,0x0A000409, 0x02020001,0x0A020001,0x02020009,0x0A020009,0x02020401,0x0A020401,0x02020409,0x0A020409}; DWORD DESKEY7[]={ 0x00000000,0x00000100,0x00080000,0x00080100,0x01000000,0x01000100,0x01080000,0x01080100, 0x00000010,0x00000110,0x00080010,0x00080110,0x01000010,0x01000110,0x01080010,0x01080110, 0x00200000,0x00200100,0x00280000,0x00280100,0x01200000,0x01200100,0x01280000,0x01280100, 0x00200010,0x00200110,0x00280010,0x00280110,0x01200010,0x01200110,0x01280010,0x01280110, 0x00000200,0x00000300,0x00080200,0x00080300,0x01000200,0x01000300,0x01080200,0x01080300, 0x00000210,0x00000310,0x00080210,0x00080310,0x01000210,0x01000310,0x01080210,0x01080310, 0x00200200,0x00200300,0x00280200,0x00280300,0x01200200,0x01200300,0x01280200,0x01280300, 0x00200210,0x00200310,0x00280210,0x00280310,0x01200210,0x01200310,0x01280210,0x01280310}; DWORD DESKEY8[]={ 0x00000000,0x04000000,0x00040000,0x04040000,0x00000002,0x04000002,0x00040002,0x04040002, 0x00002000,0x04002000,0x00042000,0x04042000,0x00002002,0x04002002,0x00042002,0x04042002, 0x00000020,0x04000020,0x00040020,0x04040020,0x00000022,0x04000022,0x00040022,0x04040022, 0x00002020,0x04002020,0x00042020,0x04042020,0x00002022,0x04002022,0x00042022,0x04042022, 0x00000800,0x
·上一篇:·下一篇:
最新更新 | ||
······························ |
| ||
| | | | | | | | ||
| ||
Copyright © 2004 - 2007 All Rights Reserved
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/10763080/viewspace-970231/,如需轉載,請註明出處,否則將追究法律責任。
上一篇:
維護無線網路安全五種必須避免的情況(轉)
請登入後發表評論
登入
全部評論
|
相關文章
- app直播原始碼,Node.js實現密碼雜湊加密APP原始碼Node.js密碼加密
- 雜湊表的程式碼實現(Java)Java
- PHP實現一致性雜湊演算法(轉的)PHP演算法
- 使用雜湊加鹽法來為密碼加密【轉】密碼加密
- 實現雜湊表
- node js如何實現密碼雜湊加密以及jwt登陸驗證JS密碼加密JWT
- 使用 password_hash 來雜湊密碼密碼
- JAVA 實現 - 雜湊表Java
- 資料結構與演算法——雜湊表類的C++實現(探測雜湊表)資料結構演算法C++
- 雜湊表的兩種實現
- 加鹽密碼雜湊:如何正確使用密碼
- 一致性雜湊演算法 PHP 實現演算法PHP
- 深入理解雜湊表(JAVA和Redis雜湊表實現)JavaRedis
- 資料結構與演算法——雜湊表類的C++實現(分離連結雜湊表)資料結構演算法C++
- iOS基於灰度的均值雜湊演算法實現影象匹配iOS演算法
- Python 雜湊表的實現——字典Python
- Redis雜湊表的實現要點Redis
- 現代密碼學之加密雜湊函式與訊息認證碼密碼學加密函式
- 快速破解雜湊密文findmyhash
- 3.1 雜湊演算法演算法
- 全面瞭解一致性雜湊演算法及PHP程式碼實現演算法PHP
- 雜湊技術【雜湊表】查詢演算法 PHP 版演算法PHP
- js 雜湊雜湊值的模組JS
- 淺析雜湊演算法演算法
- 雜湊演算法簡介演算法
- 雜湊查詢演算法演算法
- 超酷演算法:同型雜湊演算法
- 用Objective-C實現雜湊表Object
- PHP7 雜湊表實現原理PHP
- Qt 中實現非同步雜湊器QT非同步
- 資料庫裡賬號的密碼,需要怎樣安全的存放?—— 密碼雜湊(Password Hash)資料庫密碼
- 【從蛋殼到滿天飛】JS 資料結構解析和演算法實現-雜湊表JS資料結構演算法
- 【轉】感知雜湊演算法——找出相似的圖片演算法
- js實現資料結構及演算法之雜湊表(Hashtable)JS資料結構演算法
- 資料結構 - 雜湊表,三探之程式碼實現資料結構
- 【六褘-Java】雜湊演算法記憶體圖;set集合低層採用雜湊表儲存元素;雜湊演算法的流程Java演算法記憶體
- 實現鍵值對儲存(五):雜湊表實現
- 使用execAll 實現getParam():直接拿到雜湊值