Loading...

Proceedings of

Second International Conference on Advances In Electronics, Electrical And Computer Engineering EEC 2013

"CRACKING MD5 HASHES BY SIMULTANEOUS USAGE OF MULTIPLE GPUS AND CPUS OVER MULTIPLE MACHINES IN A NETWORK"

JEGA ANISH DEV
DOI
10.15224/978-981-07-6935-2-78
Pages
383 - 387
Authors
1
ISBN
978-981-07-6935-2

Abstract: “Cryptographic Hash functions find ubiquitous use in various applications like digital signatures, message authentication codes and other forms of security. Their associated vulnerabilities therefore make them a prevalent target for cyber criminals. General means of defeating hash based authentication involves both discovering and exploiting inherent weakness in cryptographic hash functions or by straight forward brute force attack on the hash Digest. The latter in most cases presents to be an extremely time intensive task. Recent times have however seen usage of GPUs for brute forcing hashes thus significantly accelerating the rate of brute forced hashes. This has further been extended to use simultaneous usage of multiple GPUs over multiple machines. Usage of CPUs for brute forcing have more or less lost importance over the advent of GPU based cracking. This paper presents an efficient method of maximally using computing resources by simultaneously using Graphics Processing Units (GPU”

Keywords: MD5 Hash cracking, CUDA based cracking, combined usage of CPU and GPU for hash cracking, Botnet computing power

Download PDF