Title
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking
Abstract
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
Year
DOI
Venue
2008
10.1109/HICSS.2008.484
Waikoloa, HI
Keywords
Field
DocType
fpga-based hardware implementation,data protection tool,cryptographic hash generation function,password-derived encryption key generation,additional key generation unit,parallelize dictionary attacks,forensic analysis tool,password-derived encryption key,initial fpga implementation,encryption key technique,dictionary attack,data protection,field programmable gate arrays,cryptography,generating function,operating system
Password cracking,Microsoft Office password protection,Password strength,Rainbow table,Computer science,S/KEY,One-time password,Password,PBKDF2,Embedded system
Conference
ISSN
ISBN
Citations 
1530-1605
0-7695-3075-8
2
PageRank 
References 
Authors
0.41
2
1
Name
Order
Citations
PageRank
Yoginder S. Dandass114711.74