Home > Research > Publications & Outputs > Acceleration attacks on PBKDF2
View graph of relations

Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Published

Standard

Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat? / Ruddick, Andrew; Yan, Jeff.
2016. Paper presented at 10th USENIX Workshop on Offensive Technologies, Austin, Texas, United States.

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Harvard

Ruddick, A & Yan, J 2016, 'Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?', Paper presented at 10th USENIX Workshop on Offensive Technologies, Austin, Texas, United States, 8/08/16 - 9/08/16. <https://www.usenix.org/system/files/conference/woot16/woot16-paper-ruddick.pdf>

APA

Ruddick, A., & Yan, J. (2016). Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?. Paper presented at 10th USENIX Workshop on Offensive Technologies, Austin, Texas, United States. https://www.usenix.org/system/files/conference/woot16/woot16-paper-ruddick.pdf

Vancouver

Ruddick A, Yan J. Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?. 2016. Paper presented at 10th USENIX Workshop on Offensive Technologies, Austin, Texas, United States.

Author

Ruddick, Andrew ; Yan, Jeff. / Acceleration attacks on PBKDF2 : or, what is inside the black-box of oclHashcat?. Paper presented at 10th USENIX Workshop on Offensive Technologies, Austin, Texas, United States.14 p.

Bibtex

@conference{700cb6bb466d4faf8e035e1acd83f2e0,
title = "Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?",
abstract = "The Password Based Key Derivation Function v2 (PBKDF2) is an important cryptographic primitive that has practical relevance to many widely deployed security systems. We investigate accelerated attacks on PBKDF2 with commodity GPUs, reporting the fastest attack on the primitive to date, outperforming the previous stateof-the-art oclHashcat. We apply our attack to Microsoft.NET framework, showing that a consumer-grade GPU can break an ASP.NET password in less than 3 hours, and we discuss the application of our attack to WiFi Protected Access (WPA2).We consider both algorithmic optimisations of crypto primitives and OpenCL kernel code optimisations and empirically evaluate the contribution of individual optimisations on the overall acceleration. In contrast to the common view that GPU acceleration is primarily driven by massively parallel hardware architectures, we demonstrate that a proportionally larger contribution to acceleration is made through effective algorithmic optimisations. Our work also contributes to understanding what is going on inside the black box of oclHashcat.",
author = "Andrew Ruddick and Jeff Yan",
year = "2016",
month = aug,
day = "8",
language = "English",
note = "10th USENIX Workshop on Offensive Technologies, WOOT '16 ; Conference date: 08-08-2016 Through 09-08-2016",
url = "https://www.usenix.org/conference/woot16",

}

RIS

TY - CONF

T1 - Acceleration attacks on PBKDF2

T2 - 10th USENIX Workshop on Offensive Technologies

AU - Ruddick, Andrew

AU - Yan, Jeff

PY - 2016/8/8

Y1 - 2016/8/8

N2 - The Password Based Key Derivation Function v2 (PBKDF2) is an important cryptographic primitive that has practical relevance to many widely deployed security systems. We investigate accelerated attacks on PBKDF2 with commodity GPUs, reporting the fastest attack on the primitive to date, outperforming the previous stateof-the-art oclHashcat. We apply our attack to Microsoft.NET framework, showing that a consumer-grade GPU can break an ASP.NET password in less than 3 hours, and we discuss the application of our attack to WiFi Protected Access (WPA2).We consider both algorithmic optimisations of crypto primitives and OpenCL kernel code optimisations and empirically evaluate the contribution of individual optimisations on the overall acceleration. In contrast to the common view that GPU acceleration is primarily driven by massively parallel hardware architectures, we demonstrate that a proportionally larger contribution to acceleration is made through effective algorithmic optimisations. Our work also contributes to understanding what is going on inside the black box of oclHashcat.

AB - The Password Based Key Derivation Function v2 (PBKDF2) is an important cryptographic primitive that has practical relevance to many widely deployed security systems. We investigate accelerated attacks on PBKDF2 with commodity GPUs, reporting the fastest attack on the primitive to date, outperforming the previous stateof-the-art oclHashcat. We apply our attack to Microsoft.NET framework, showing that a consumer-grade GPU can break an ASP.NET password in less than 3 hours, and we discuss the application of our attack to WiFi Protected Access (WPA2).We consider both algorithmic optimisations of crypto primitives and OpenCL kernel code optimisations and empirically evaluate the contribution of individual optimisations on the overall acceleration. In contrast to the common view that GPU acceleration is primarily driven by massively parallel hardware architectures, we demonstrate that a proportionally larger contribution to acceleration is made through effective algorithmic optimisations. Our work also contributes to understanding what is going on inside the black box of oclHashcat.

M3 - Conference paper

Y2 - 8 August 2016 through 9 August 2016

ER -