Due to the development of GPGPU (General Purpose Graphic Processing Unit) technology, GPU has been applied in many computation tasks as accelerators. In this paper, a new password recovery technique for the standardized hash functions, MD5 and SHA1, are proposed by combining the optimization methods on GPU. The performance on AMD HD7970 is 2615 mc/s for SHA1 and 6877 mc/s for MD5, which is 10 times better than the original implementation. If the length of password is limited, our GPU-based technique makes it possible to recover password from hash values in a reasonable time
Homomorphic hash functions (HHF) play a key role in securing distributed systems that use coding tec...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Cavazos, JohnFile matching is an important topic in eld of forensics and information security. With...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
The article considers methods of fixing storing passwords in hashed form security vulnerability. Sug...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
In the digital world, the demand for data security during communication has increased. Hash function...
Abstract. Passwords are still by far the most widely used form of user authentication, for applicati...
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP,...
The main goal of this thesis was to expand tool Wrathion by adding yet unsupported encryption method...
This paper exploits parallel computing power of graphics cards to accelerate state space search. We ...
With the advent of a telemedicine technology, many medical services can be provided remotely, which ...
Password-based key derivation functions (KDFs) are used to generate secure keys of arbitrary length ...
Homomorphic hash functions (HHF) play a key role in securing distributed systems that use coding tec...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Cavazos, JohnFile matching is an important topic in eld of forensics and information security. With...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
The article considers methods of fixing storing passwords in hashed form security vulnerability. Sug...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
In the digital world, the demand for data security during communication has increased. Hash function...
Abstract. Passwords are still by far the most widely used form of user authentication, for applicati...
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP,...
The main goal of this thesis was to expand tool Wrathion by adding yet unsupported encryption method...
This paper exploits parallel computing power of graphics cards to accelerate state space search. We ...
With the advent of a telemedicine technology, many medical services can be provided remotely, which ...
Password-based key derivation functions (KDFs) are used to generate secure keys of arbitrary length ...
Homomorphic hash functions (HHF) play a key role in securing distributed systems that use coding tec...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Cavazos, JohnFile matching is an important topic in eld of forensics and information security. With...