Beruflich Dokumente
Kultur Dokumente
Mamatha G Ashoka B M
Asst.Professor, Dept. of MCA Department of MCA
Achrya Institute of Technology Acharya Institute of Technology
Soldevanahalli,Bangalore-90 Soldevanahalli, Bangalore-9
E-Mail: bmsgm@yahoo.com E-Mail: asbm_sagar@yahoo.co.in
ABSTRACT: Computer hacking is the practice of modifying computer hardware and software to
accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking
activities are often called hackers. Since the word “hack” has long been used to describe someone who is
incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate
recognition to their skills.
In this research paper highly focus on hacking of security systems. The hacking algorithms are
implemented and used for the breaking a security system.
KEY WORDS: Hacking, permutations, combinations, comparison, bit operation, shift Bits.
—————————— ——————————
1 INTRODUCTION
If x[i,j] = =0 then
x[i,i] =1 ;
010101 - 1010101 Else
<< 0010110 - 0101110 x [i,j] = 0:
End if
0010101 - 1 101010
If x [3, i] = =0 then
<<1101000- 0010111 x[3,i] = 1 ;
Shift Bits on the Matrix Table Else
x [3,i] = 0i
End if
End for
End for
010101 - 1010101
<< 0010110 - 0101110 [Apply the left shift operation to the 2 and
nd
0010101 - 1 101010 th
4 row]
<<1101000- 0010111
Actual Matrix Operated Matrix For i from 0 to 7
For j from 7 to 8
Shift [2,1] = shift [2,1]+1
Res [i,j] = bitwise (x[I,j]<<shift [i, j ]);
Repeatedly shift all 8 bits until the nearest match
Shift [4, i] = shift [4, i] +4;
find in the actual matrix in this algorithm bitwise
Res [i,j] = bitwise (x[i,j] << shift [i,j]);
operation can be applied for the finding a nearest
End for
matching combination of bits. Only 0 and 1 can be
End for
used in this comparison of matrix .The left shift
operator shifts one bit it may be 0 or 1 to the left
side in the sense multiplying by two repeatedly
[Compare actual matrix with operated
different combination bits generated and compare
matrix]
with the actual matrix. These is no need of
For i from 0 to n-4
accurate matching of bits .70% of the match found
For j from 0 to n-i-4
in the actual matrix with operated matrix then the
if res [i,j] = x [ i,j] then
system will allow grant across permission , to the
Print (“Access granted”);
user.
End if
End for
ALGORITHM
End for
[Read data [finger print data] from database]
for I from 0 to n-1
In the FPA algorithm res [i,j] contains the
for I from 0 to n-i-1
actual matrix and x[I,j] contains the
Read [i,j] =dbase [i,j]
operated matrix.
End for
End for
STIMULATION AND TESTING
[split the data into matrix from 8 bits]
The password breaker algorithm highly
For I from 0 to 7
effective and more efficient for testing
For j from 0 to 7-i-4
results of this algorithm.
Temp [I, J] = Read [I, j]
End for
End for
st rd
[Complement 1 and 3 row data]
For I from 0 to 7
For j from 1 to 8
INTERNATIONAL CONFERENCE ON “CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION -2009, 4th-6th June 2009
ACKNOWLEDGMENT
AUTHORS