scholarly journals BRUTE FORCE PASSWORD CRACKING DENGAN MENGGUNAKAN GRAPHIC PROCESSING POWER

2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Himawan Pramaditya
2014 ◽  
Author(s):  
Ionuţ-Daniel BARBU ◽  
Gabriel PETRICĂ

With the advent of Internet of Things, large number of devices became connected to the cloud via various services. From an Information Security perspective, this aspect adds additional tasks to the defense in depth layers. This article tackles the authentication level and its options. This topic has been chosen, as user/password authentication is obsolete and no longer secure. Despite the increased complexity of the passwords, the use of rainbow tables and the large processing power available, the systems are vulnerable to brute force attacks.


2017 ◽  
Vol 7 (1) ◽  
Author(s):  
Sayed Achmady

Dalam konteks kriptanalisis dan keamanan komputer, dictionary attack adalah sebuah teknik untuk melawan cipher atau melawan mekanisme otentikasi dengan cara menentukan kunci dekripsi dengan mencari kemungkinan kombinasi kata yang terdapat di dalam sebuah kamus [1]. Pada dasarnya dictionary attack adalah pengembangan dari brute force attack, yaitu mencoba memecahkan kode dengan mencoba satu per satu kemungkinan secara berulang (exhaustive search). Akan tetapi dictionary attack bukan mencoba kombinasi satu per satu karakter yang tersedia seperti brute force, melainkan mencoba kombinasi kata yang paling mungkin berhasil dengan input sebuah “list of kata” yang dapat didefinisikan (disebut juga kamus), yang biasanya berasal dari daftar kombinasi kata-kata umum yang terdapat dalam kamus, misalnya kamus bahasa Inggris. Dictionary attack merupakan serangan yang sangat efektif untuk memecahkan kode dan sering digunakan hacker untuk membobol sistem keamanan yang berupa password, seperti akun email, akun jejaring sosial, halaman administrator situs web, dan lain-lain. Dictionary attack dianggap efektif karena memanfaatkan psikologi manusia, yaitu kebiasaan bahwa pengguna akun akan menggunakan kata-kata yang lumrah dan mudah diingat sebagai password suatu akun tertentu [2]. Selain itu, dictionary attack juga dikembangkan variasinya dan semakin tinggi efektivitasnya, sehingga hingga saat ini teknik ini masih sering digunakan untuk membobol password pengguna sebuah akun. jurnal ini membahas mengenai studi dictionary attack mengenai penjelasan singkat, prinsip kerja, dan bagaimana pengembangan dari dictionary attack dalam konteks penerapannya untuk membobol password sebuah akun tertentu. Variasi dari dictionary attack yang akan dibahas dalam makalah ini yaitu dictionary attack, hybrid dictionary attack, dan pre-computed dictionary attack. Selain itu, pada makalah ini akan dianalisis kelebihan dan kelemahan dictionary attack dan masing-masing modifikasinya, serta solusi yang dapat dilakukan dalam melawan dictionary attack. Kata kunci: Dictionary Attack, password, brute force, kamus, list of hash.


2012 ◽  
Vol 532-533 ◽  
pp. 1080-1084 ◽  
Author(s):  
Zhi Cai Shi ◽  
Can Qun Yang ◽  
Qiang Wu

MD5 Crypt is a cryptographic algorithm used commonly in UNIX system for authentication. Thanks to the additional randomization of the salt and complexity of the scheme, it makes the traditional password cracking techniques invalid on common computing systems so that the security of the system is guaranteed. As a result of the thriving of petaflops heterogeneous supercomputer system in recent decades, the security of MD5 Crypt is facing a threat of brute-force attack again. However, the complexity of heterogeneous programming and the sophistication of large-scale parallelism still hamper the password recovering. In this paper, we implemented brute-force attack of MD5 Crypt on Tianhe-1A,the world’s fastest supercomputer, by organizing the assignment between CPU and GPU reasonably and making several optimizations according to MD5 Crypt for GPU. Based on the experimental results, our algorithm achieves a great scalability. It checked more than 1.8 billion passwords in a second on the full system. Thus it issues a new challenge to the security of MD5 crypt for authentication.


Author(s):  
Emanuel Tirado ◽  
Brendan Turpin ◽  
Cody Beltz ◽  
Phillip Roshon ◽  
Rylin Judge ◽  
...  

2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Rahul Dixit ◽  
Harpreet Singh

Modern military ranging, tracking, and classification systems are capable of generating large quantities of data. Conventional “brute-force” computational techniques, even with Moore’s law for processors, present a prohibitive computational challenge, and often, the system either fails to “lock onto” a target of interest within the available duty cycle, or the data stream is simply discarded because the system runs out of processing power or time. In searching for high-fidelity convergence, researchers have experimented with various reduction techniques, often using logic diagrams to make inferences from related signal data. Conventional Boolean and fuzzy logic systems generate a very large number of rules, which often are difficult to handle due to limitations in the processors. Published research has shown that reasonable approximations of the target are preferred over incomplete computations. This paper gives a figure of merit for comparing various logic analysis methods and presents results for a hypothetical target classification scenario. Novel multiquantization Boolean approaches also reduce the complexity of these multivariate analyses, making it possible to better use the available data to approximate target classification. This paper shows how such preprocessing can reasonably preserve result confidence and compares the results between Boolean, multi-quantization Boolean, and fuzzy techniques.


2009 ◽  
Vol 5 (2) ◽  
pp. 10 ◽  
Author(s):  
Jose Luis Zamorano ◽  

3D echocardiography (3DE) will gain increasing acceptance as a routine clinical tool as the technology evolves due to advances in technology and computer processing power. Images obtained from 3DE provide more accurate assessment of complex cardiac anatomy and sophisticated functional mechanisms compared with conventional 2D echocardiography (2DE), and are comparable to those achieved with magnetic resonance imaging. Many of the limitations associated with the early iterations of 3DE prevented their widespread clinical application. However, recent significant improvements in transducer and post-processing software technologies have addressed many of these issues. Furthermore, the most recent advances in the ability to image the entire heart in realtime and fully automated quantification have poised 3DE to become more ubiquitous in clinical routine. Realtime 3DE (RT3DE) systems offer further improvements in the diagnostic and treatment planning capabilities of cardiac ultrasound. Innovations such as the ability to acquire non-stitched, realtime, full-volume 3D images of the heart in a single heart cycle promise to overcome some of the current limitations of current RT3DE systems, which acquire images over four to seven cardiac cycles, with the need for gating and the potential for stitch artefacts.


Sign in / Sign up

Export Citation Format

Share Document