22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedde 2017
DOI: 10.1109/cse-euc.2017.226
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Password Recovery for SHA-512 on GPUs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The study will utilize a modified SHA-512 algorithm with additional security layers, including randomly generated salt and the Bcrypt algorithm [14], to enhance email security against phishing, spoofing, and A distributed denial-of-service (DDoS) attacks [21]- [25]. Comprehensive evaluation will encompass hash construction, computational efficiency, data integrity, collision resistance, and attack resistance.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study will utilize a modified SHA-512 algorithm with additional security layers, including randomly generated salt and the Bcrypt algorithm [14], to enhance email security against phishing, spoofing, and A distributed denial-of-service (DDoS) attacks [21]- [25]. Comprehensive evaluation will encompass hash construction, computational efficiency, data integrity, collision resistance, and attack resistance.…”
Section: Methodsmentioning
confidence: 99%
“…Comprehensive evaluation will encompass hash construction, computational efficiency, data integrity, collision resistance, and attack resistance. The avalanche effect will be quantified, and hash-cracking experiments will verify protective efficiency [21]. Additionally, data integrity and collision resistance will be rigorously assessed.…”
Section: Methodsmentioning
confidence: 99%
“…Aggarwal [21] implemented the Bcrypt and SHA512 algorithms by using distributed cloud computing. Ge et al [22] optimized the exhaustive attack of the SHA512 algorithm on the GPU. Dürmuth et al [23] implemented two types of hash passwords, Bcrypt and Scrypt, on a GPU and FPGA, respectively.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…Unlike online attacks where 10 10 bogus login attempts are easily noticeable, it is easy to compute that many hashes offline, on special-made machines. This is one of the main risks with database leaks, as even consumer machines can nowadays brute-force more than 1 billion such hashes per second [15,11,43].…”
Section: Best Practicesmentioning
confidence: 99%