Password cracking is a process used to obtain the cracking key through which we get access to encrypted data. This process normally works on the principle of the repeated try of attempts and their verification by making calculations of cryptographic algorithms. The difficulty of algorithms affects the time spent on solving of the calculations. In spite of various acceleration methods, it is often necessary to distribute the given problem among several nodes which are interconnected via the local network or the internet. The aim of this thesis is to analyze the influence of network infrastructure on the speed, the scalability, and the utilization during different attacks on cryptographical hashes. For these purposes, there was created an a...
The advent of cloud computing has decreased the cost of enterprise level system design and implement...
Abstract: The current generation of network vulnerability detection software uses databases of known...
Password policies alone do not stand a chance of securing computer systems which rely on the use of ...
This thesis introduces viable password recovery tools and their categories as well as the technologi...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
The following thesis covers several ways to optimize distributed computing platforms for cryptanalyt...
Abstract: In this paper, it provides a brief description about the different password cracking tools...
This project examines the nature of password cracking and modern applications. Several applications...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Part 2: Access ControlInternational audienceIn this work, we aim to measure the impact of hash funct...
This work deals with crytpoanalysis, calculation performance and its distribution. It describes the ...
The Fitcrack project is a distributed system for cracking cryptographic hashes developed at FIT BUT....
Although there have been many solutions applied, the safety challenges related to the password secur...
Abstract—The design of computer and communication systems has been based, for decades, on the fundam...
The advent of cloud computing has decreased the cost of enterprise level system design and implement...
Abstract: The current generation of network vulnerability detection software uses databases of known...
Password policies alone do not stand a chance of securing computer systems which rely on the use of ...
This thesis introduces viable password recovery tools and their categories as well as the technologi...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
The following thesis covers several ways to optimize distributed computing platforms for cryptanalyt...
Abstract: In this paper, it provides a brief description about the different password cracking tools...
This project examines the nature of password cracking and modern applications. Several applications...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Part 2: Access ControlInternational audienceIn this work, we aim to measure the impact of hash funct...
This work deals with crytpoanalysis, calculation performance and its distribution. It describes the ...
The Fitcrack project is a distributed system for cracking cryptographic hashes developed at FIT BUT....
Although there have been many solutions applied, the safety challenges related to the password secur...
Abstract—The design of computer and communication systems has been based, for decades, on the fundam...
The advent of cloud computing has decreased the cost of enterprise level system design and implement...
Abstract: The current generation of network vulnerability detection software uses databases of known...
Password policies alone do not stand a chance of securing computer systems which rely on the use of ...