Password Cracking on Graphics Processing Unit Based Systems
Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
[1] Silberschatz, Galvin, Gagne, “Operating Systems Concepts,” 8th Edition, Wiley India Edition, 2009.
[2] http://www.threatmetrix.com/learn-to-hack-and-crack-passwords-in-a-day-without-breaking-a-sweat-using-free-online-tools (9 October 2015).
[3] http://www.oxid.it/ca_um/topics/brute-force_password_cracker.htm (9 October 2015).
[4] Stallings W., Brown L., “Computer Security: Principles and Practice,” Prentice Hall, 2nd Edition, 2011.
[5] Weir M., Aggarwal S., Collins M., Stern H., “Testing metrics for password creation policies by attacking large sets of revealed passwords,” Proceedings of the 17th ACM conference on Computer and communications security (CCS '10), ACM, NY, USA, 162-175, 2010.
[6] Marechal S., “Advances in password cracking,” Journal in Computer Virology, vol. 4, no. 1, pp. 73–81, February, 2008.
[7] Aleksandar Kasabov, Jochem van Kerkwijk, Marc Smeets, and et al., “Distributed GPU Password Cracking,” Universiteit Van Amsterdam, May, 2011.
[8] Benedict Gaster et al. “Heterogeneous Computing with OpenCL,” Elsevier, 2012.
[9] Kai Hwang and Faye A. Briggs, “Computer Architecture and Parallel Processing,” TMH Private Ltd., 2012.
[10] Peter Pachico, “An introduction to parallel programming,” Elsevier, 2011.
[11] Michael J. Quinn, "Parallel computing: Theory and practice," McGraw-Hill Inc., 2008.
[12] K. Hwang, “Advanced Computer Architecture: Parallelism, Scalability, Programmability,” New York, McGraw-Hill, 1993.
[1] Silberschatz, Galvin, Gagne, “Operating Systems Concepts,” 8th Edition, Wiley India Edition, 2009.
[2] http://www.threatmetrix.com/learn-to-hack-and-crack-passwords-in-a-day-without-breaking-a-sweat-using-free-online-tools (9 October 2015).
[3] http://www.oxid.it/ca_um/topics/brute-force_password_cracker.htm (9 October 2015).
[4] Stallings W., Brown L., “Computer Security: Principles and Practice,” Prentice Hall, 2nd Edition, 2011.
[5] Weir M., Aggarwal S., Collins M., Stern H., “Testing metrics for password creation policies by attacking large sets of revealed passwords,” Proceedings of the 17th ACM conference on Computer and communications security (CCS '10), ACM, NY, USA, 162-175, 2010.
[6] Marechal S., “Advances in password cracking,” Journal in Computer Virology, vol. 4, no. 1, pp. 73–81, February, 2008.
[7] Aleksandar Kasabov, Jochem van Kerkwijk, Marc Smeets, and et al., “Distributed GPU Password Cracking,” Universiteit Van Amsterdam, May, 2011.
[8] Benedict Gaster et al. “Heterogeneous Computing with OpenCL,” Elsevier, 2012.
[9] Kai Hwang and Faye A. Briggs, “Computer Architecture and Parallel Processing,” TMH Private Ltd., 2012.
[10] Peter Pachico, “An introduction to parallel programming,” Elsevier, 2011.
[11] Michael J. Quinn, "Parallel computing: Theory and practice," McGraw-Hill Inc., 2008.
[12] K. Hwang, “Advanced Computer Architecture: Parallelism, Scalability, Programmability,” New York, McGraw-Hill, 1993.
@article{"International Journal of Information, Control and Computer Sciences:71563", author = "N. Gopalakrishna Kini and Ranjana Paleppady and Akshata K. Naik", title = "Password Cracking on Graphics Processing Unit Based Systems", abstract = "Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.", keywords = "GPGPU, password cracking, secret key, user
authentication.", volume = "9", number = "12", pages = "2449-4", }