Cryptanalysis of Hash Functions Using Advanced Multiprocessing

被引:0
|
作者
Gomez, J. [1 ]
Montoya, F. G. [1 ]
Benedicto, R. [1 ]
Jimenez, A. [1 ]
Gil, C. [1 ]
Alcayde, A. [1 ]
机构
[1] Univ Almeria, Almeria, Spain
关键词
CUDA; MPI; hash; audit tools; rainbow tables; brute force;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Every time it is more often to audit the communications in companies to verify their right operation and to check that there is no illegal activity. The main problem is that the tools of audit are inefficient when communications are encrypted. There are hacking and cryptanalysis techniques that allow intercepting and auditing encrypted communications with a computational cost so high that it is not a viable application in real time. Moreover, the recent use of Graphics Processing Unit (GPU) in high-performance servers is changing this trend. This article presents obtained results from implementations of brute force attacks and rainbow table generation, sequentially, using threads, MPI and CUDA. As a result of this work, we designed a tool (myEchelon) that allows auditing encrypted communications based on the use of hash functions.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 50 条
  • [41] Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
    Agrawal, Megha
    Chang, Donghoon
    Ghosh, Mohona
    Sanadhya, Somitra Kumar
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 343 - 360
  • [42] Quantum cryptanalysis of the full AES-256-based Davies–Meyer, Hirose and MJH hash functions
    Seungjun Baek
    Sehee Cho
    Jongsung Kim
    Quantum Information Processing, 21
  • [43] Hash functions
    Jenkins, B
    DR DOBBS JOURNAL, 1997, 22 (09): : 107 - +
  • [44] Cryptanalysis and Improvement of a Fast Hash Family for Memory Integrity
    Xu, Chengbo
    Yang, Shuying
    International Journal of Network Security, 2024, 26 (04) : 679 - 685
  • [45] Cryptanalysis of a key agreement protocol based on chaotic Hash
    He, Debiao
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 172 - 177
  • [46] Cryptanalysis of the Tillich-Z,mor Hash Function
    Grassl, Markus
    Ilic, Ivana
    Magliveras, Spyros
    Steinwandt, Rainer
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 148 - 156
  • [47] Cryptanalysis of RC4-based hash function
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    Steinfeld, Ron
    Conferences in Research and Practice in Information Technology Series, 2012, 125 : 33 - 38
  • [48] Cryptanalysis of a Hash Function Based on Norm Form Equations
    Aumasson, Jean-Philippe
    CRYPTOLOGIA, 2009, 33 (01) : 12 - 15
  • [49] Cryptanalysis of the Round-Reduced GOST Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 309 - 322
  • [50] Cryptanalysis of a hash function, and the modular subset sum problem
    Monico, Chris
    GROUPS COMPLEXITY CRYPTOLOGY, 2019, 11 (01) : 17 - 23