Filters








44 Hits in 5.4 sec

Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud

Atishay Aggarwal, Pranav Chaphekar, Rohit Mandrekar
2015 International Journal of Computer Applications  
The study considers a different approach using distributed processing to compute multiple hashes at a very high speed, making one of the most widely used hashing algorithm SHA-512[2] seem not that secure  ...  Passwords are one of the commonly used method to protect one's personal information against the intruders. But storing passwords as plaintext is not safe, hence they are saved in form of hashes.  ...  With GPU never going over 60% utilization, thus was not performing optimally. SHA-512 Figure 3.  ... 
doi:10.5120/ijca2015906744 fatcat:l6lrcvqvszgxxdcdrc7ryynmki

BitCracker: BitLocker meets GPUs [article]

Elena Agostini, Massimo Bernaschi
2019 arXiv   pre-print
We analyze the performance of our CUDA implementation on several Nvidia GPUs and we carry out a comparison of our SHA-256 hash with the Hashcat password cracker tool.  ...  BitLocker decryption process requires the computation of a very large number of SHA- 256 hashes and also AES, so we propose a very fast solution, highly tuned for Nvidia GPU, for both of them.  ...  The authors would like to thank Solar Designer and the John The Ripper team, for the access to the Openwall HPC Village. Bibliography  ... 
arXiv:1901.01337v1 fatcat:kexa7t2uj5b4rk7xxww7tb2zx4

Implementation of high speed hash function Keccak on GPU

Thuong Nguyen Dat, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa
2019 International Journal of Networking and Computing  
In this paper, the implementation of high speed hash function Keccak-512 using the integrated development environment CUDA for GPU is proposed.  ...  However, the security level of the password management will be further reduced by implementing a high speed hash function on GPU.  ...  Advanced password recovery utility Hashcat Hashcat [20] is known as the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized  ... 
doi:10.15803/ijnc.9.2_370 fatcat:zex7b3kgmbganpmiczhqu5n2jq

Hybrid CPU/GPU Platform For High Performance Computing

Michal Marks, Ewa Niewiadomska-Szynkiewicz
2014 ECMS 2014 Proceedings edited by: Flaminio Squazzoni, Fabio Baronio, Claudia Archetti, Marco Castellani  
The results of numerical experiments performed for parallel implementations of password recovery algorithms are presented to illustrate the performance of our systems.  ...  The first solution (HGCC) is a software platform for data processing in heterogenous CPU/GPU clusters. The second solution (HGCVC) is an extension version of the previous one.  ...  Multiple tests were performed for parallel implementations of password recovery from MD5, SHA-1 and SHA-2 hashes utilizing brute-force technique, and hybrid CPU&GPU computing.  ... 
doi:10.7148/2014-0508 dblp:conf/ecms/MarksN14 fatcat:zs5j46or5jhgvkyw3azx5gjxpm

Using Graphics Processors for Parallelizing Hash-Based Data Carving

Sylvain Collange, Yoginder S. Dandass, Marc Daumas, David Defour
2009 2009 42nd Hawaii International Conference on System Sciences  
Unique identifying pattern for each disk sector is compared against patterns in known images.  ...  The GPU-based implementation outperforms the software implementation by a significant margin.  ...  SHA-1 is also widely used for password based cryptography.  ... 
doi:10.1109/hicss.2009.494 dblp:conf/hicss/CollangeDDD09 fatcat:3brg5zwz4rh7lnyobdri6nuug4

Using Graphics Processors for Parallelizing Hash-based Data Carving [article]

Sylvain Collange, Marc Daumas
2009 arXiv   pre-print
Unique identifying pattern for each disk sector is compared against patterns in known images.  ...  The GPU-based implementation outperforms the software implementation by a significant margin.  ...  SHA-1 is also widely used for password based cryptography.  ... 
arXiv:0901.1307v1 fatcat:7o5yazffwza7dj7hfzrt6aw7va

Reconfigurable and High-efficiency Password Recovery Algorithms Based on HRCA

Bin Li, Feng Feng, Xiaojie Chen, Yan Cao
2021 IEEE Access  
The traditional password recovery system is based mainly on the CPU and GPU and has a low energy efficiency ratio and cracking efficiency and cannot meet high-performance computing requirements.  ...  Password recovery based on the hash algorithm is an important means of electronic forensics, encrypted information restoration, illegal information filtering, and network security maintenance.  ...  In terms of GPUs, Qiu et al. [18] designed and optimized the SHA1 and MD5 password recovery algorithms on the GPU and improved the password generation algorithm to match the computing speed.  ... 
doi:10.1109/access.2021.3053068 fatcat:4352zqo6bfaotfpcmaoyvnooki

Application-Specific System Processor for the SHA-1 Hash Algorithm [article]

Carlos E. B. S. Júnior, Matheus F. Torquato, Marcelo A. C. Fernandes
2018 arXiv   pre-print
Various applications such as password recovery, password validation, and high volume data integrity checking can be performed efficiently and quickly with an ASSP for SHA1.  ...  The results showed that the hardware proposed for the SHA-1 achieved a throughput of 0.644 Gbps for a single instance and slightly more than 28 Gbps for 48 instances in a single FPGA.  ...  Acknowledgments The authors wish to acknowledge the financial support of the Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) for their financial support.  ... 
arXiv:1901.04989v1 fatcat:a645flvqebcfbejgjuibsnbgg4

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

Alexandr Kuznetsov, V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko, Andrii Kolhatin
2021 International Journal of Computer Network and Information Security  
Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest).  ...  The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.  ...  Further research can be focused on comparing the statistical properties of hash algorithms.  ... 
doi:10.5815/ijcnis.2021.02.01 fatcat:anjwdkpksbf7bgb53n4e3tfi5q

Lyra: password-based key derivation with tunable memory and processing costs

Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio
2014 Journal of Cryptographic Engineering  
We present Lyra, a password-based key derivation scheme based on cryptographic sponges.  ...  ., custom hardware or a powerful GPU).  ...  Using a RIVYERA S3-5000 cluster [40] with 128 FPGAs against PBKDF2-SHA-512, the authors reported a throughput of 356,352 passwords tested per second in an architecture having 5,376 password processed in  ... 
doi:10.1007/s13389-013-0063-5 fatcat:adiniudiifc3jg3ewbkzv6hsge

A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords

Zhendong Zhang, Peng Liu
2020 Transactions on Cryptographic Hardware and Embedded Systems  
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid CPU-FPGA devices.  ...  Our experimental results show that the proposed accelerator can improve energy efficiency by 2.54x over the state-of-the-art password recovery tool Hashcat running on an NVIDIA GTX1080Ti GPU.  ...  With these techniques, our accelerator achieves 2.54× improvement on energy efficiency compared with the state-of-the-art password recovery tool Hashcat running on an NVIDIA GTX1080Ti GPU.  ... 
doi:10.13154/tches.v2020.i4.1-23 dblp:journals/tches/ZhangL20 fatcat:5aohfmp5hnb4zn6nigjqq5lebi

The Risks of WebGL: Analysis, Evaluation and Detection [article]

Alex Belkin, Nethanel Gelernter, Israel Cidon
2019 arXiv   pre-print
We focus on two possible abuses of this feature: distributed password cracking and distributed cryptocurrency mining.  ...  Exploiting WebGL for attacks will affect billions of users since browsers serve as the main interaction mechanism with the world wide web.  ...  One example of these hash cracking tools is an advanced password recovery tool created by Team Hashcat.  ... 
arXiv:1904.13071v1 fatcat:qclshlxlqzaorcvmw7fftegzmy

An FPGA Architecture for the Recovery of WPA/WPA2 Keys

Tyler Johnson, Daniel Roggow, Phillip H. Jones, Joseph Zambreno
2015 Journal of Circuits, Systems and Computers  
-256 < 2 64 512 32 256 SHA-384 < 2 128 1024 64 384 SHA-512 < 2 128 1024 64 512 SHA-512/224 < 2 128 1024 64 224 SHA-512/256 < 2 128 1024 64 256 Table 3.2 Secure Hash Algorithm Properties [21] .2 shows the  ...  Message C also informs the supplicant that the communication channel is Table 3 3 Algorithm Message Size Block Size Word Size Message Digest Size SHA-1 < 2 64 512 32 160 SHA-224 < 2 64 512 32 224 SHA  ... 
doi:10.1142/s0218126615501054 fatcat:cwfnq2wz4ve27haxywrqnhtwuq

Data Protection: Combining Fragmentation, Encryption, and Dispersion, a final report [article]

Gerard Memmi, Katarzyna Kapusta, Patrick Lambein, Han Qiu
2017 arXiv   pre-print
Then, we focus on two kind of fragmentation. First, a selective separation of information in two fragments a public one and a private one.  ...  This is being enabled by a number of parallel and distributed architectures using various set of cores or machines ranging from General Purpose GPUs to multiple clouds.  ...  As pointed out in Section 2.3.2, the DWT-2D, SHA-256 and SHA-512 can benefit from the GPU acceleration, so the design is based on the parallel execution of CPU with GPU while the GPU will take calculation  ... 
arXiv:1512.02951v2 fatcat:lowauzqyxrbnllx4hxcz5fkxp4

Reconfigurable Computing A review of the technology and its architecture

Gagandeep Singh
2013 IOSR Journal of VLSI and Signal processing  
achieving high level of performance for a specific application.  ...  This paper illustrates the architecture used in reconfigurable computing and also demonstrates the advantages of using reconfigurable computing design over conventional ASIC or a simple microprocessor for  ...  Recovering FileVault passwords requires hashing a possible password with the SHA-1 hash function thousands of times.  ... 
doi:10.9790/4200-0340814 fatcat:b57img7vdrcfjic2fp6om6u5c4
« Previous Showing results 1 — 15 out of 44 results