Distributed Password Cracking in a Hybrid Environment
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F17%3APU126390" target="_blank" >RIV/00216305:26230/17:PU126390 - isvavai.cz</a>
Výsledek na webu
<a href="http://www.fit.vutbr.cz/research/pubs/all.php?id=11358" target="_blank" >http://www.fit.vutbr.cz/research/pubs/all.php?id=11358</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Distributed Password Cracking in a Hybrid Environment
Popis výsledku v původním jazyce
For forensic experts, encrypted data nowadays represent one of the biggest challenges. With criminal suspects unwilling to surrender their passwords, the only way to obtain the encryption key is by password disclosure or password cracking. Modern cryptographic techniques are being enhanced to provide the maximum level of security making it impossible for a single man with a computer to crack the password within a meaningful time. General-purpose computing on graphics processing units (GPUs) often accelerates the entire process. Nevertheless, a single-machine GPU cracking has still its limits. Thus, the only way of achieving the desired amount of computational power is distributed cracking. Not in every case the forensic investigators possess a dedicated computer cluster powerful enough to serve their needs. Complex problems may require merging multiple clusters together as well as the use of general-purpose hardware to get as much computational power as possible. The computers may be even located in geographically separated areas, e.g. multiple corporation branches, requiring a solution for secure and reliable interconnection and control of the machines. Using Berkeley Open Infrastructure for Network Computing (BOINC) framework together with our specialized modules, we designed a solution for distributed password recovery in a hybrid environment including, but not limited to, individual general-purpose CPU nodes, GPU nodes, and specialized CPU/GPU clusters. The solution is feasible for a variable number of nodes in an untrusted and unstable environment, by offering proper adaptivity and robustness. In the paper, we provide the experimental results of distributed cracking in a hybrid CPU/GPU environment. The experiments include both exhaustive search and dictionary attack. We analyze the results of different approaches using several types of hardware. Our goal is to provide a survey comparing possible attack techniques and connecting t
Název v anglickém jazyce
Distributed Password Cracking in a Hybrid Environment
Popis výsledku anglicky
For forensic experts, encrypted data nowadays represent one of the biggest challenges. With criminal suspects unwilling to surrender their passwords, the only way to obtain the encryption key is by password disclosure or password cracking. Modern cryptographic techniques are being enhanced to provide the maximum level of security making it impossible for a single man with a computer to crack the password within a meaningful time. General-purpose computing on graphics processing units (GPUs) often accelerates the entire process. Nevertheless, a single-machine GPU cracking has still its limits. Thus, the only way of achieving the desired amount of computational power is distributed cracking. Not in every case the forensic investigators possess a dedicated computer cluster powerful enough to serve their needs. Complex problems may require merging multiple clusters together as well as the use of general-purpose hardware to get as much computational power as possible. The computers may be even located in geographically separated areas, e.g. multiple corporation branches, requiring a solution for secure and reliable interconnection and control of the machines. Using Berkeley Open Infrastructure for Network Computing (BOINC) framework together with our specialized modules, we designed a solution for distributed password recovery in a hybrid environment including, but not limited to, individual general-purpose CPU nodes, GPU nodes, and specialized CPU/GPU clusters. The solution is feasible for a variable number of nodes in an untrusted and unstable environment, by offering proper adaptivity and robustness. In the paper, we provide the experimental results of distributed cracking in a hybrid CPU/GPU environment. The experiments include both exhaustive search and dictionary attack. We analyze the results of different approaches using several types of hardware. Our goal is to provide a survey comparing possible attack techniques and connecting t
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
<a href="/cs/project/VI20172020062" target="_blank" >VI20172020062: Integrovaná platforma pro zpracování digitálních dat z bezpečnostních incidentů (TARZAN)</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2017
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of SPI 2017
ISBN
978-80-7231-414-0
ISSN
—
e-ISSN
—
Počet stran výsledku
16
Strana od-do
75-90
Název nakladatele
Brno University of Defence
Místo vydání
Brno
Místo konání akce
Brno
Datum konání akce
1. 6. 2017
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—