Question: Exercise 2 : Lan Manager hash [ 2 0 pts ] Back in the days, up to Windows XP , Windows account passwords were hashed
Exercise : Lan Manager hash pts
Back in the days, up to Windows XP Windows account passwords were hashed using Microsoft's LAN
Manager LM hash function, which works as follows:
Step The password is converted into upper case, nullpadded to characters or truncated to
characters and split into two character halves.
Step Each half is separately converted into a DES key. This key is used to encrypt the ASCII
string KGS@#$ producing an byte value.
Step The two byte values are concatenated, resulting in a byte hash.
Suppose the attacker obtains a file with hashed passwords. How much work would he need to do
at most, to crack these passwords by bruteforce search? Show your calculations. Express the result
in scientific notation and round it to two decimals. Assume that
users could type any of the printable characters found on a US keyboard ie letters, numbers,
symbols, and punctuation marks, which are represented by codes to in the ASCII table.
Passwords could be any length.
Knowing that a single modern NVIDIA GeForce RTX GPU can perform for LM
how long would it take an attacker with one such GPU to crack these hashes? Assume that the
overhead of matching a bit string in a list of bit strings is negligible.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
