Cryptanalysis of Hash Functions Using Advanced Multiprocessing

被引:0
|
作者
Gomez, J. [1 ]
Montoya, F. G. [1 ]
Benedicto, R. [1 ]
Jimenez, A. [1 ]
Gil, C. [1 ]
Alcayde, A. [1 ]
机构
[1] Univ Almeria, Almeria, Spain
关键词
CUDA; MPI; hash; audit tools; rainbow tables; brute force;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Every time it is more often to audit the communications in companies to verify their right operation and to check that there is no illegal activity. The main problem is that the tools of audit are inefficient when communications are encrypted. There are hacking and cryptanalysis techniques that allow intercepting and auditing encrypted communications with a computational cost so high that it is not a viable application in real time. Moreover, the recent use of Graphics Processing Unit (GPU) in high-performance servers is changing this trend. This article presents obtained results from implementations of brute force attacks and rainbow table generation, sequentially, using threads, MPI and CUDA. As a result of this work, we designed a tool (myEchelon) that allows auditing encrypted communications based on the use of hash functions.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of Hash Functions
    Mendel, Florian
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : XVIII - XIX
  • [2] Cryptanalysis of Hash Functions with Structures
    Khovratovich, Dmitry
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 108 - 125
  • [3] Cryptanalysis of the LSH hash functions
    Hao, Yonglin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3296 - 3308
  • [4] Cryptanalysis of the HaF Family of Hash Functions
    Buczek, Mateusz
    Kontak, Marcin
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [5] Cryptanalysis of the ESSENCE Family of Hash Functions
    Mouha, Nicky
    Sekar, Gautham
    Aumasson, Jean-Philippe
    Peyrin, Thomas
    Thomsen, Soren S.
    Turan, Meltem Soenmez
    Preneel, Bart
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 15 - +
  • [6] Processing Cryptanalysis of Hash Functions using Graphics Processing Units
    Gomez, J.
    Gil, C.
    Montoya, F. G.
    Marquez, A. L.
    Molero, G.
    Alcayde, A.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, GRID AND CLOUD COMPUTING FOR ENGINEERING, 2011, 95
  • [7] CRYPTANALYSIS OF THE HAF FAMILY OF HASH FUNCTIONS
    Buczek, Mateusz
    Kontak, Marcin
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2015, 52 (02) : 277 - 287
  • [8] Applications of SAT solvers to cryptanalysis of hash functions
    Mironov, Ilya
    Zhang, Lintao
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2006, PROCEEDINGS, 2006, 4121 : 102 - 115
  • [9] Full Cryptanalysis of LPS and Morgenstern Hash Functions
    Petit, Christophe
    Lauter, Kristin
    Quisquater, Jean-Jacques
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 263 - +
  • [10] Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis
    de Freitas, Daniel Santana
    Nakahara, Jorge, Jr.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 471 - 477