{"id":"https://openalex.org/W2921174653","doi":"https://doi.org/10.5220/0007360503280335","title":"Improved Forensic Recovery of PKZIP Stream Cipher Passwords","display_name":"Improved Forensic Recovery of PKZIP Stream Cipher Passwords","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921174653","doi":"https://doi.org/10.5220/0007360503280335","mag":"2921174653"},"language":"en","primary_location":{"id":"doi:10.5220/0007360503280335","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007360503280335","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007360503280335","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034600940","display_name":"Sein Coray","orcid":null},"institutions":[{"id":"https://openalex.org/I4210118689","display_name":"Joint Research Centre","ror":"https://ror.org/02qezmz13","country_code":"IT","type":"government","lineage":["https://openalex.org/I1320481043","https://openalex.org/I2800387288","https://openalex.org/I4210118689","https://openalex.org/I4210161702"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Sein Coray","raw_affiliation_strings":["European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---","institution_ids":["https://openalex.org/I4210118689"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014138734","display_name":"Iwen Coisel","orcid":"https://orcid.org/0000-0001-6571-8441"},"institutions":[{"id":"https://openalex.org/I4210118689","display_name":"Joint Research Centre","ror":"https://ror.org/02qezmz13","country_code":"IT","type":"government","lineage":["https://openalex.org/I1320481043","https://openalex.org/I2800387288","https://openalex.org/I4210118689","https://openalex.org/I4210161702"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Iwen Coisel","raw_affiliation_strings":["European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---","institution_ids":["https://openalex.org/I4210118689"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101579730","display_name":"Ignacio Sanchez","orcid":"https://orcid.org/0000-0003-3619-6175"},"institutions":[{"id":"https://openalex.org/I4210118689","display_name":"Joint Research Centre","ror":"https://ror.org/02qezmz13","country_code":"IT","type":"government","lineage":["https://openalex.org/I1320481043","https://openalex.org/I2800387288","https://openalex.org/I4210118689","https://openalex.org/I4210161702"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ignacio Sanchez","raw_affiliation_strings":["European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"European Commission, Joint Research Centre (DG JRC) - Via Enrico Fermi 2749, 21027 Ispra (VA) and Italy, --- Select a Country ---","institution_ids":["https://openalex.org/I4210118689"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034600940"],"corresponding_institution_ids":["https://openalex.org/I4210118689"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.01964475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.7640596628189087},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6329987049102783},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6125668287277222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5243680477142334},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.46373191475868225},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44781163334846497}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.7640596628189087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6329987049102783},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6125668287277222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5243680477142334},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.46373191475868225},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44781163334846497}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0007360503280335","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007360503280335","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0007360503280335","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007360503280335","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1659518869","https://openalex.org/W3125786183","https://openalex.org/W2137478866","https://openalex.org/W2390578388","https://openalex.org/W1954550103","https://openalex.org/W4293907469","https://openalex.org/W2390218944","https://openalex.org/W2363245723","https://openalex.org/W2156444280","https://openalex.org/W168427323"],"abstract_inverted_index":{"Data":[0],"archives":[1],"are":[2,107,151],"often":[3],"compressed":[4],"following":[5],"the":[6,16,21,36,45,66,70,76,142,158,161],"PKZIP":[7,17,37,71],"format":[8],"and":[9,81],"can":[10,88],"optionally":[11],"be":[12,89,115,172],"encrypted":[13,183],"with":[14],"either":[15],"stream":[18,38,72],"cipher":[19,73],"or":[20],"AES":[22],"block":[23],"cipher.":[24,39],"In":[25],"this":[26,43],"article,":[27],"we":[28],"present":[29],"new":[30],"implementations":[31,150],"of":[32,69,79,104,160],"two":[33,149],"attacks":[34,49],"against":[35],"To":[40],"our":[41,148],"knowledge,":[42],"is":[44,61,125,164],"first":[46,59],"time":[47],"those":[48,105],"have":[50],"been":[51],"demonstrated":[52],"on":[53,181],"Graphical":[54],"Processing":[55],"Unit":[56],"(GPU).":[57],"Our":[58],"implementation":[60,124],"retrieving":[62],"archive":[63],"passwords":[64,109],"using":[65],"internal":[67],"state":[68,159],"obtained":[74],"through":[75],"known-plaintext":[77],"attack":[78,129],"Biham":[80],"Kocher.":[82],"Passwords":[83],"up":[84,110],"to":[85,111,131],"length":[86,112],"14":[87],"recovered":[90,116],"within":[91],"a":[92,95,126],"month":[93],"considering":[94],"single":[96],"Nvidia":[97],"1080":[98],"Ti":[99],"GPU.":[100],"If":[101],"one":[102],"hundred":[103],"cards":[106],"available,":[108],"15":[113],"would":[114],"in":[117,175],"less":[118],"than":[119,141,157],"27":[120],"days.":[121],"The":[122],"second":[123],"more":[127],"direct":[128],"designed":[130],"retrieve":[132],"an":[133,165,182],"archive\u2019s":[134],"password":[135],"without":[136],"requiring":[137],"any":[138],"additional":[139],"knowledge":[140],"ciphertext.":[143],"Experimental":[144],"results":[145],"show":[146],"that":[147],"at":[152],"least":[153],"ten":[154],"times":[155],"faster":[156],"art.":[162],"This":[163],"undeniable":[166],"asset":[167],"for":[168],"investigators":[169],"who":[170],"may":[171],"particularly":[173],"interested":[174],"further":[176],"deepening":[177],"their":[178],"forensic":[179],"analysis":[180],"archive.":[184]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
