Computational & Technology Resources
an online resource for computational,
engineering & technology publications |
|
Civil-Comp Proceedings
ISSN 1759-3433 CCP: 95
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, GRID AND CLOUD COMPUTING FOR ENGINEERING Edited by:
Paper 29
Processing Cryptanalysis of Hash Functions using Graphics Processing Units J. Gómez, C. Gil, F.G. Montoya, A.L. Márquez, G. Molero and A. Alcayde
University of Almeria, Spain , "Processing Cryptanalysis of Hash Functions using Graphics Processing Units", in , (Editors), "Proceedings of the Second International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering", Civil-Comp Press, Stirlingshire, UK, Paper 29, 2011. doi:10.4203/ccp.95.29
Keywords: CUDA, MPI, hash, audit tools, rainbow tables, brute force.
Summary
Cryptographic primitives such as block ciphers, hash functions are such an integral part of everyday computing. There are hacking and cryptanalysis techniques that allow intercepting and auditing encrypted communications with a computational cost so high that it is not a viable application in real time. Moreover, the recent use of graphics processing unit (GPU) in high-performance servers is changing this trend.
The classical way to break the hash functions is to use brute force attacks [1] that consist on generating all possible solutions until the right one is found. This implies a high computational cost for large and complex passwords. For that, it becomes necessary to find an efficient solution to this problem. This solution was found in the use of Rainbow tables [2] that is an elegant solution from hash tables [3] created by Hellman, avoiding as far as possible the large number of collisions inherited from his predecessor. The disadvantage of both techniques is that they have a very high computational cost, making infeasible their use with conventional equipment. Although the cryptanalysis is capable of breaking the hash functions, so far, these algorithms are considered computationally expensive, because they require too much processing time for a real application. To analyze the performance of cryptanalysis, brute force attacks and generating rainbow tables are compared in a sequential way, using threads, MPI and GPUs with CUDA. All results have been obtained on the server MX DUAL AZServer Xenon and NVIDIA Tesla S1070. The server has two processors Dual/Quad Core Intel Xenon 2.66 GHz, 8 2Gb SDRAM and two SATA hard drives of 1TB in RAID 1. Moreover, the Tesla S1070 has four Tesla T10 processors each having a total of 960 cores of 1.44 GHz each one. References
purchase the full-text of this paper (price £20)
go to the previous paper |
|