Quantum Search
How to Use
- Click on the Choose File button and select the list of passwords you want.
- Enter the MD5 hash you want to find.
- Click on the Search button.
**If no file is uploaded, the system will use a default file.**
Method A: Simple Hash Bucket Approach
- In this method, the final reduction plaintext are placed into Bucket based on the simplified alternative hashing method.
- Based on the Hash inputted, the Hash is first reduced into the final reduction plaintext.
- Hash will perform the simplified alternative hashing method.
- A lookup of the Bucket of the Hash inputted will be done.
- If the Bucket exists, a search using the Grover's Algorithm will check if the Bucket Key of the Hash inputted exists in the Rainbow Table's Bucket.
- If the result is found, a linear search is done to locate the inputter's hash, and the chain is rebuilt to retrieve the plaintext.
- Else if the result is not found, the inputted hash is reduced again, and the process repeats from step 3 again.
Method B: ASCII Sum Bucket Approach
- In this method, the final reduction plaintext are placed into Bucket based on the ASCII Sum Bucket Approach.
- Based on the Hash inputted, the Hash is first reduced into the final reduction plaintext.
- Hash will perform the ASCII Sum Bucket method.
- A search using the Grover's Algorithm will check if the Bucket Key of the Hash inputted exists in the Rainbow Table's.
- If the result is found, a linear search is done to locate the inputter's hash, and the chain is rebuilt to retrieve the plaintext.
- Else if the result is not found, the inputted hash is reduced again, and the process repeats from step 3 again.