期刊文献+

Security of Password Hashing in Cloud

Security of Password Hashing in Cloud
下载PDF
导出
摘要 Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords. Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords.
作者 Parves Kamal
出处 《Journal of Information Security》 2019年第2期45-68,共24页 信息安全(英文)
关键词 Index Terms-Hash Collision GPGPU CUDA OPENCL Index Terms-Hash Collision GPGPU CUDA OpenCL
  • 相关文献

参考文献2

二级参考文献12

  • 1John T. The Ripper Password Cracker[EB/OL]. [2010-01-25], http://www.openwall.com/john/.
  • 2Boeing A. Survey and Future Trends of Efficient Cryptographic Function Implementations on GPGPUs[C]//Proc. of the 6th Australian Digital Forensics Conference. Perth, Australia: [s. n.], 2008.
  • 3Thomas E. The Open Standard for Parallel Programming of Heterogeneous Systems[EB/OL]. [2010-01-25]. http://www. khronos.org/opencl/.
  • 4Rivest R. The MD5 Message-digest Algorithm[M]. Berlin, Germany: [s. n.], 1992.
  • 5Corporation N.CUDA Programming Guide[EB/OL].www.nvdia.com.2009.2.
  • 6Nvidia.The CUDA Compiler Driver NVCC.2008.
  • 7Tehver M.General Purpose GPU Programming with CUDA(演讲稿).2007.
  • 8Portegies Z S F,Belleman R G,Geldof P M.High-performance direct gravitational N-body simulations on graphics processing units[J].NewAstron,2007,12:641-650.
  • 9Dongarra J,Foster I,Fox G,et al.Sourcebook of Parallel Computing[M].Elsevier Science,2003.
  • 10Kider Jr J T.GPU as a Parallel Machine:Sorting on theGPU[C] ∥Proc.of CIS'05.2005.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部