The following thesis covers several ways to optimize distributed computing platforms for cryptanalytic purposes. After an introduction on password storage, password guessing attacks and distributed computing in general, a set of inital benchmark results for a variety of different devices will be analyzed. The shown results are mainly based on utilization of the open source password recovery tool Hashcat. The second part of this work shows an algorithmic implementation for information retrieval and workload generation. This thesis can be used for the conception of a distributed computing system, inventory analysis of available hardware devices, runtime and cost estimations for specific jobs and finally strategic workload distribution
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Attacks on cryptographic systems are limited by the available computational resources. A theoretical...
As more services move on to the web and more people use the cloud for storage of important informati...
The following thesis covers several ways to optimize distributed computing platforms for cryptanalyt...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
This thesis introduces viable password recovery tools and their categories as well as the technologi...
The aim of this thesis is a distributed solution for password recovery, using hashcat tool. The basi...
One of the major challenges in digital forensics today is data encryption. Due to the leaked informa...
This work deals with crytpoanalysis, calculation performance and its distribution. It describes the ...
Password cracking is a process used to obtain the cracking key through which we get access to encryp...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
A distributed brute force algorithm to solve the problem of diminishing returns when more processors...
The aim of the article is to present the password breaking methodology in case when an attacker (for...
In this work we have analyzed some password hashing schemes for performance under various settings o...
Part 2: Access ControlInternational audienceIn this work, we aim to measure the impact of hash funct...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Attacks on cryptographic systems are limited by the available computational resources. A theoretical...
As more services move on to the web and more people use the cloud for storage of important informati...
The following thesis covers several ways to optimize distributed computing platforms for cryptanalyt...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
This thesis introduces viable password recovery tools and their categories as well as the technologi...
The aim of this thesis is a distributed solution for password recovery, using hashcat tool. The basi...
One of the major challenges in digital forensics today is data encryption. Due to the leaked informa...
This work deals with crytpoanalysis, calculation performance and its distribution. It describes the ...
Password cracking is a process used to obtain the cracking key through which we get access to encryp...
This thesis should introduce a reader with basic objectives of parallel computing followed by distri...
A distributed brute force algorithm to solve the problem of diminishing returns when more processors...
The aim of the article is to present the password breaking methodology in case when an attacker (for...
In this work we have analyzed some password hashing schemes for performance under various settings o...
Part 2: Access ControlInternational audienceIn this work, we aim to measure the impact of hash funct...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Attacks on cryptographic systems are limited by the available computational resources. A theoretical...
As more services move on to the web and more people use the cloud for storage of important informati...