2016
DOI: 10.15394/jdfsl.2016.1380
|View full text |Cite
|
Sign up to set email alerts
|

On Efficiency of Distributed Password Recovery

Abstract: One of the major challenges in digital forensics today is data encryption. Due to the leaked information about unlawful sniffing, many users decided to protect their data by encryption. In case of criminal activities, forensic experts are challenged how to decipher suspects' data that are subject to investigation. A common method how to overcome password-based protection is a brute force password recovery using GPU-accelerated hardware. This approach seems to be expensive. This paper presents an alternative ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…It is hard to hit a hash value calculated by a long random string for the salted hash [17]. To accelerate the attack speed, some researchers focus on improving the hash calculation speed to make attackers try faster [18], including designing a special application-specific integrated circuit (ASIC) to calculate hash functions and deploy the program on distributed computers [19][20][21][22]. Accelerating the guessing speed is crucial to making more guesses, but our research in this article focuses on generating high-quality passwords.…”
Section: Introductionmentioning
confidence: 99%
“…It is hard to hit a hash value calculated by a long random string for the salted hash [17]. To accelerate the attack speed, some researchers focus on improving the hash calculation speed to make attackers try faster [18], including designing a special application-specific integrated circuit (ASIC) to calculate hash functions and deploy the program on distributed computers [19][20][21][22]. Accelerating the guessing speed is crucial to making more guesses, but our research in this article focuses on generating high-quality passwords.…”
Section: Introductionmentioning
confidence: 99%
“…In the software implementation, traditional password recovery based on the CPU architecture is limited by its computational speed for cryptographic algorithms and can crack only passwords with low complexity. For GPUs, highthroughput password recovery algorithms such as SHA1 and MD5 are implemented by means of multicore parallel computing [7]- [9]. However, the GPU has high power consumption and a low energy efficiency ratio.…”
Section: Introductionmentioning
confidence: 99%