Title :
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking
Author :
Dandass, Yoginder S.
Author_Institution :
Mississippi State Univ., Starkville
Abstract :
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation´s performance can be easily improved by incorporating additional key generation units.
Keywords :
cryptography; field programmable gate arrays; CPSK#5 technique; FPGA; cryptographic hash generation function; data protection; dictionary attacks; operating systems; password cracking; password derived encryption key; Cryptography; Dictionaries; Field programmable gate arrays; Forensics; Hardware; Operating systems; Protection; Standards publication; Throughput; Workstations;
Conference_Titel :
Hawaii International Conference on System Sciences, Proceedings of the 41st Annual
Conference_Location :
Waikoloa, HI
DOI :
10.1109/HICSS.2008.484