skip to main content
10.5555/2671293.2671303guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Are your passwords safe: energy-efficient bcrypt cracking with low-cost parallel hardware

Published:19 August 2014Publication History

ABSTRACT

Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware improvements [13]. Expensive key setup with user-defined cost setting makes this hash slow while rapid random 32-bit lookups using Blowfish's variable S-boxes require 4 KB of local memory per instance. This memory access pattern makes bcrypt moderately unfriendly to parallel implementation on modern CPUs, where on one hand gather addressing is required in order to exploit the CPUs' SIMD capabilities, and on the other even when gather addressing is in fact available the L1 data cache size becomes the limiting factor. Despite of this (and due to it), it is possible to achieve much better performance per Watt with bcrypt implementations on homogeneous and heterogeneous multiprocessing platforms: Parallella board with 16- or 64-core Epiphany accelerator and ZedBoard with Zynq reconfigurable logic [16, 2]. Proposed implementations were integrated into John the Ripper password cracker resulting in improved energy efficiency by a factor of 35+ compared to heavily optimized implementations on modern CPUs.

References

  1. ADAPTEVA. Epiphany Architecture Reference. http://adapteva.com/docs/epiphany_arch_ref.pdf, 2013.Google ScholarGoogle Scholar
  2. ADAPTEVA. Parallella Computer Specifications. http://www.parallella.org/board/, 2013.Google ScholarGoogle Scholar
  3. ADAPTEVA. Parallella Reference Manual. http://www.parallella.org/docs/parallella_manual.pdf, 2013.Google ScholarGoogle Scholar
  4. DESIGNER, S., AND MARECHAL, S. Password security: past, present, future. http://www.openwall.com/presentations/ Passwords12-The-Future-Of-Hashing/, 2012.Google ScholarGoogle Scholar
  5. F. WIEMER, R. Z. Speed and Area-Optimized Password Search of bcrypt on FPGAs.Google ScholarGoogle Scholar
  6. FOUNDATION, E. F. EFF DES cracker. http://en.wikipedia.org/wiki/EFF_DES_cracker, 1998.Google ScholarGoogle Scholar
  7. KIRAN, L. K., ABHILASH, J. E. N., AND KUMAR, P. S. FPGA Implementation of Blowfish Cryptosystem Using VHDL.Google ScholarGoogle Scholar
  8. MALVONI, K., AND DESIGNER, S. Energy-efficient bcrypt cracking. http://www.openwall.com/presentations/ Passwords13-Energy-Efficient-Cracking/, 2013.Google ScholarGoogle Scholar
  9. OPENWALL. John the Ripper password cracker. http://www.openwall.com/john/.Google ScholarGoogle Scholar
  10. OPENWALL. Modern password hashing for your software and your servers. http://www.openwall.com/crypt/.Google ScholarGoogle Scholar
  11. PATEL, M. C. R., GOHIL, P. N. B., AND SHAH, P. V. FPGA - hardware based DES and Blowfish symmetric cipher algorithms for encryption and decryption of secured wireless data communication.Google ScholarGoogle Scholar
  12. POPPITZ, M. FPGA Based UNIX Crypt Hardware Password Cracker. http://www.sump.org/projects/password/, 2006.Google ScholarGoogle Scholar
  13. PROVOS, N., AND MAZIÈRES, D. A Future-Adaptable Password Scheme. Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference (1999). Google ScholarGoogle Scholar
  14. SIMMLER, H., KUGEL, A., MANNER, R., VIEIRA, A., GALVEZ-DURAND, DE ALCANTARA, F., J.M.S., AND ALVES, V. Implementation of cryptographic applications on the reconfigurable FPGA coprocessor microEnable.Google ScholarGoogle Scholar
  15. XILINX. Xilinx Zynq-7000 All Programmable SoC ZC706 Evaluation Kit. http://www.xilinx.com/products/ boards-and-kits/EK-Z7-ZC706-G.htm.Google ScholarGoogle Scholar
  16. XILINX. XUP ZedBoard. http://www.xilinx.com/ support/university/boards-portfolio/xup-boards/ XUPZedBoard.html.Google ScholarGoogle Scholar
  17. XILINX. Zynq-7000 All Programmable SoC Family of Reconfigurable Devices.Google ScholarGoogle Scholar
  18. ZTEX. USB-FPGA Module 1.15. http://www.ztex.de/ usb-fpga-1/usb-fpga-1.15.e.html.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image Guide Proceedings
    WOOT'14: Proceedings of the 8th USENIX conference on Offensive Technologies
    August 2014
    17 pages

    Publisher

    USENIX Association

    United States

    Publication History

    • Published: 19 August 2014

    Qualifiers

    • Article