Harden Up: Can We Break Your Password With Our GPUs?
-
Page 1:Need A Locksmith?
-
Page 2:Test Setup
-
Page 3:Archive Encryption: WinZip And WinRAR
-
Page 4:Exploring Password Strength
-
Page 5:Password Cracking: CPU-Powered
-
Page 6:Password Cracking: GPGPU-Style
-
Page 7:Nvidia Versus AMD: Brute-Force Attack Performance
-
Page 8:Security: WinZip And WinRAR
-
Page 9:Final Words
Do you think your passwords are keeping your data nice and safe? Do you have archived files you don't want anyone to see? Let's see how fast we can crack your lock using our graphics cards. If anything, this is a wake-up call to lock down your valuables!
Locking your keys in the car is never fun. The last time that happened, I spent the better part of my day waiting for a locksmith. Happily, I can say that's one of those mistakes that I only made once; I haven't lost sight of my keys since.
The funny thing is that, for all of my deliberate effort, I simply cannot keep track of my digital keys (passwords) when I sit down at a computer. There are just so many of them, and we're trained to not use the same one on every site. Physical keys are just easier to keep track of. Even when you lose them, they're still somewhere. It's all a matter of retracing your steps. Besides, at least there are specialists (like locksmiths) to help lower that security barrier, if you really need them.
That's also true when it comes to passwords, at least to a certain extent. Whether it's your email or bank account, online password recovery is generally a painless process. There's usually some sort of a "Forgot Your Password?" link that allows you to reclaim access. However, the prospects for digital files are usually more forlorn. I recently discovered this while I was trying to access an old encrypted WinZip archive.
Before we dive too deep into password recovery, we should point out that there are many ways to protect your data. If you're looking for a more comprehensive solution, we would suggest something like TrueCrypt (check out Protect Your Data! TrueCrypt 7.0a's Performance, Analyzed), which is even more attractive now that it supports AES-NI instructions. Yet, archive encryption remains the most ubiquitous way to secure data. Whether you're someone in HR emailing the weekly payroll or Blake Lively trying to keep those personal iPhone photos a little more personal, encrypting an archive is fast and easy.

There is, however, a bit of a misunderstanding on just how secure your data can really be. If you're paranoid about security, you're naturally going to favor the strongest encryption scheme possible. The presumption is that a stronger encryption scheme is more difficult to break, suggesting that AES-256 is better than AES-128. That's not the whole truth. Think of encryption like a big vault. The thicker the armor, the harder it is to penetrate the safe. However, the security of a vault is only as good as the lock that secures it. That is what a password does. It's the vault's key. The longer your password, the more complicated the lock and the more secure your data is.
Most people assume that an eight-character-long password is good enough to keep hackers at bay. That's not exactly true either, and we're about to show you why.

Sudoku puzzles have numbers from 1 through 9!
9 or 10 characters?
Sudoku puzzles have numbers from 1 through 9!
Fixed! Sorry. I usually play Sudoku variants.
I could understand that, but I left out that since I was trying to show a simple example of how permutations differ from combinations. As you pointed out, repetitions are allowed in passwords. I actually mention that in the sentence that follows in the next paragraph.
It wouldn't be easy from a design standpoint, cause now you're talking about fiddling with the design of the program.
The easiest way to slow down the verification portion of the password authentication process is increasing the number of transformation invocations for key generation. The problem is that this slows down the performance of your machine, even if you have the correct password.
That assumes WinZip and WinRAR supports them. To be honest, I haven't looked into that. Though, I'm inclined to believe that neither program supports them.
Saw something on this elsewhere recently (http://www.zdnet.com/blog/hardware/cheap-gpus-are-rendering-strong-passwords-useless/13125)
I've changed the password for important (tangible value) passwords such as that for my steam account to a password that now uses a few special characters, and some mixed up numbers, lower and upper case letters, totalling 18 characters. (lol)
Now I have a few different tiers of passwords, a now replaced 8 string of letters and numbers for unimportant things a couple of years ago, a now replaced string of 15 characters for semi-important things a couple years ago (have real world information or usefulness for a potential bad guy), their 8 and 15 respectively replacements and my new 18 character string for things that have definite tangible real world value to potential nasties.
And being only 15 I think I'm on the right track
The only thing that *really* worries me are the choice of security questions sometimes. If you're not allowed to pick your own, the answer would be easy to find on my Facebook page or similar (if I had one
Actually, AccentZIP and AccentRAR are real world derivatives of the ighashgpu program that Zdnet wrote about. Ivan Golubev actually wrote the code for all three programs and we had the pleasure of working with him to write this article. The difference is that with ighashgpu, you're mainly looking at hash cracking.
http://www.securityweek.com/commercial-software-harnesses-amazon-cloud-crack-passwords-faster
Linky Linky
Interesting. According to the article, it seems that the password recovery speed is limited by the internet connection.
I seem to recall seeing someone mention that a pair of 590s was faster than 30000 passwords per second with Elcomsoft's GPGPU document cracker.
Heck, assuming only 2002 SHA-1 transformations, a single GTX 460 would be faster.
http://passwordadvisor.com/TipsUsers.aspx
Would also be interesting to see if Sandy Bridge AES instructions helps on brute force.