期刊文献+

基于GPU集群实现MD5的快速破解

Implementation of MD5 Fast Crack Based on GPU Cluster
下载PDF
导出
摘要 从单个GPU异构并行系统来看,其性能还是比较有限,文章阐述了基于GPU集群的CUDA架构实现过程,详细分析基于GPU集群进行MD5快速破解的编译过程,并对破解程序进行测试研究,对其运行结果进行测试和分析,探讨搭建GPU高性能计算集群及其进行MD5算法的快速破解的过程。 View from a single GPU heterogeneous parallel system, its performance is still relatively limited, the paper described the CUDA architecture based on GPU cluster implementation process, analyzed the process of MD5 fast crack compilation detailed based on GPU cluster MD5, and testing research of the crack program, and analysis of its operating results, explored the structures of GPU high-performance computing cluster and its rapid crack MD5 algorithm.
作者 杨胜斌
机构地区 肇庆工商学院
出处 《电脑与信息技术》 2013年第2期54-56,共3页 Computer and Information Technology
关键词 GPU集群 MD5 破解 GPU cluster MD5 crack
  • 相关文献

参考文献15

  • 1WangXiaoyiin, YuHongho. How to Break MD5 and Other Hash Functions[C]//Prooeedings of CRYPTO ^OS.AarhusJ^nmarkrfs.n.],2005.
  • 2Corporation N. CUDA Programming Guide [EB/OL]. http //: www.nvdia.com.2009.2.
  • 3张建伟,李鑫,张梅峰.基于MD5算法的身份鉴别技术的研究与实现[J].计算机工程,2003,29(4):118-119. 被引量:33
  • 4Tehver M.(General Purpose GPU Programming with CUDA[Z]. speech inDenison University,2007 .
  • 5Portegies Z S F,Belleman K G,Geldof P M.High-performance directgravitational N-body simulations on graphics processing units [J].NewAstron,2007(12):641-650.
  • 6Dongarra J,Foster I,Fox G,et al.Sourcebook of Parallel Com-puting[M].Elsevier Science,2003 .
  • 7Kider Jr J T.GPU as a Parallel Marhine:Sorting on theGPU [C].Proc.ofCIS’05, 2005.
  • 8Lee H,Kwon T,Cho D H.An Enhanced Uplink Scheduling AlgorithmBased on Voice Acticity for VoIP Services in IEEE 802.16(l/e System[J],IEEE Communication Letters,2005,9(8):691 -693.
  • 9Sung M 0,CHo S,Kwun J.VoIF Scheduling Algorithm for AMR SpeechCodec in IEEE 802. 16e7m System [J]. IEEE Communication Lelter^,2008,12(5):374-376.
  • 10Avoine GJunod P,Oechslin P. Characterization and Improvement ofTime—memory Irade-ofT Based on Perfect Tables [J].ACM Trans.onInformation and System Security,2008,11 (4): 1 -22.

二级参考文献14

  • 1[4]Kent S,Atkinson R.RFC 2401:ecurity Architecture for the Internet Protocol.IETF,Internet,1998-11
  • 2Tian Zhihong,Fang Binxing,Yun Xiaochun.An Architecture for Intrusion Detection Using Honey Pot[C].2003 International Conference on Machine Learning and Cybernetics,2003,4:2096
  • 3Civie V,Civie R.Future Technologies from Trends in Computer Forensic Science[C].IEEE,Information Technology Conference,1998:105-108.
  • 4Jiqiang L,Zhen H,Zengwei L.Secure Audit Logs Server to Support Computer Forensics in Criminal Investigations[C].TENCON '02,Proceedings of IEEE Region 10 Conference on Computers,Communications,Control and Power Engineering,2002,1:180-183.
  • 5Abraham T,de Vel O.Investigative Profiling with Computer Forensic Log Data and Association Rules.Proceedings of 2002 IEEE International Conference on Data Mining,2002:11-8.
  • 6Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design[Z]. 1998.
  • 7Curtin M, Dolske J. A Brute Force Search of DES Keyspace. (1998-05-11). http://www.interhack.net/pubs/des-key-crack/.
  • 8付安民.对称密码算法暴力破解的研究现状和进展[C]//北京地区高校研究生学术交流会议论文集.北京:[s.n.],2006.
  • 9曾志峰,杨义先.基于身份认证和加密技术的包过滤防火墙系统的设计与实现[J].计算机工程与应用,1999,35(12):1-3. 被引量:10
  • 10王贵竹,李津生,洪佩琳.MD5报文摘要算法与IPv6认证[J].小型微型计算机系统,2001,22(1):126-128. 被引量:6

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部