Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt to recover those passwords. To prevent such a recovery, various password hashing schemes can be used to store passwords securely. However, recent advances in the graphics processing unit (GPU) hardware challenge the way we have to look at secure password storage. GPU’s have proven to be suitable for crypto-graphic operations and provide a significant speedup in performance compared to traditional central processing units (CPU’s). This research focuses on the security requirements and properties of prevalent pass-word hashing schemes. Moreover, we present a proof of concept that launches an exhaustive search attack on the MD5-crypt password has...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Abstract—Using passwords for user authentication is still the most common method for many internet s...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
Due to the development of GPGPU (General Purpose Graphic Processing Unit) technology, GPU has been a...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
Powerful and programmable Graphics Processing Units have become commonplace in consumer-grade comput...
Contains fulltext : 103778.pdf (publisher's version ) (Closed access)SHARCS 2012 :...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
The article considers methods of fixing storing passwords in hashed form security vulnerability. Sug...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Abstract—It has become much easier to crack a password hash with the advancements in the graphicalpr...
Abstract. Passwords are still by far the most widely used form of user authentication, for applicati...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Abstract—Using passwords for user authentication is still the most common method for many internet s...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
Due to the development of GPGPU (General Purpose Graphic Processing Unit) technology, GPU has been a...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
Powerful and programmable Graphics Processing Units have become commonplace in consumer-grade comput...
Contains fulltext : 103778.pdf (publisher's version ) (Closed access)SHARCS 2012 :...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
The article considers methods of fixing storing passwords in hashed form security vulnerability. Sug...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Abstract—It has become much easier to crack a password hash with the advancements in the graphicalpr...
Abstract. Passwords are still by far the most widely used form of user authentication, for applicati...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Abstract—Using passwords for user authentication is still the most common method for many internet s...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...