Cryptanalysis of Hash Functions Using Advanced Multiprocessing

被引:0
|
作者
Gomez, J. [1 ]
Montoya, F. G. [1 ]
Benedicto, R. [1 ]
Jimenez, A. [1 ]
Gil, C. [1 ]
Alcayde, A. [1 ]
机构
[1] Univ Almeria, Almeria, Spain
关键词
CUDA; MPI; hash; audit tools; rainbow tables; brute force;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Every time it is more often to audit the communications in companies to verify their right operation and to check that there is no illegal activity. The main problem is that the tools of audit are inefficient when communications are encrypted. There are hacking and cryptanalysis techniques that allow intercepting and auditing encrypted communications with a computational cost so high that it is not a viable application in real time. Moreover, the recent use of Graphics Processing Unit (GPU) in high-performance servers is changing this trend. This article presents obtained results from implementations of brute force attacks and rainbow table generation, sequentially, using threads, MPI and CUDA. As a result of this work, we designed a tool (myEchelon) that allows auditing encrypted communications based on the use of hash functions.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of the LAKE Hash Family
    Biryukov, Alex
    Gauravaram, Praveen
    Guo, Jian
    Khovratovich, Dmitry
    Ling, San
    Matusiewicz, Krystian
    Nikolic, Ivica
    Pieprzyk, Josef
    Wang, Huaxiong
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 156 - +
  • [22] Cryptanalysis of the tiger hash function
    Mendel, Florian
    Rijmen, Vincent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 536 - 550
  • [23] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security
    Kim, Hangi
    Kim, Do-won
    Yi, Okyeon
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) : 3107 - 3130
  • [24] Cryptanalysis of the GOST hash function
    Mendel, Florian
    Pramstaller, Norbert
    Rechberger, Christian
    Kontak, Marcin
    Szmidt, Janusz
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 162 - +
  • [25] Cryptanalysis of the LANE Hash Function
    Wu, Shuang
    Feng, Dengguo
    Wu, Wenling
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 126 - 140
  • [26] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security
    Hangi Kim
    Do-won Kim
    Okyeon Yi
    Jongsung Kim
    Multimedia Tools and Applications, 2019, 78 : 3107 - 3130
  • [27] On hash functions using checksums
    Gauravaram, Praveen
    Kelsey, John
    Knudsen, Lars R.
    Thomsen, Soren S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 137 - 151
  • [28] On hash functions using checksums
    Praveen Gauravaram
    John Kelsey
    Lars R. Knudsen
    Søren S. Thomsen
    International Journal of Information Security, 2010, 9 : 137 - 151
  • [29] Cryptanalysis of T-function-based hash functions - Applications to MySQL password algorithms
    Muller, Frederic
    Peyrin, Thomas
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 267 - 285
  • [30] Cryptanalysis of the AEAD and hash algorithm DryGASCON
    Liang, Huicong
    Mesnager, Sihem
    Wang, Meiqin
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (03): : 597 - 625