Cryptanalysis the SHA-256 Hash Function Using Rainbow Tables


Manankova O.A. Yakubova M.Z. Baikenov A.S.
December 2022Institute of Advanced Engineering and Science

Indonesian Journal of Electrical Engineering and Informatics
2022#10Issue 4930 - 944 pp.

The research of the strength of a hashed message is of great importance in modern authentication systems. The hashing process is inextricably linked with the password system, since passwords are usually stored in the system not in clear text, but as hashes. The SHA-256 hash function was chosen to model the attack with rainbow tables. An algorithm for constructing a rainbow table for the SHA-256 hash function in the Java language is proposed. The conditions under which the use of rainbow tables will be effective are determined. This article aims to practically show the process of generating a password and rainbow tables to organize an attack on the SHA-256 hash function. As research shows, rainbow tables can reveal a three-character password in 3 seconds. As the password bit increases, the decryption time increases in direct proportion.

Attack , Hash function , Java , Rainbow tables , SHA-256

Text of the article Перейти на текст статьи

Department of Telecommunications and Space Engineering, Faculty of Telecommunications and Innovation Technologies, Almaty University of Power Engineering and Telecommunications name after Gumarbek Daukeev, Almaty, Kazakhstan
Department of Information Technology, Faculty of Information Systems and Cybersecurity, Almaty University of Power Engineering and Telecommunications name after Gumarbek Daukeev, Almaty, Kazakhstan

Department of Telecommunications and Space Engineering
Department of Information Technology

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026