Loading…

Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming

Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in differen...

Full description

Saved in:
Bibliographic Details
Published in:Applied sciences 2023-05, Vol.13 (10), p.5979
Main Authors: Alkhwaja, Ibrahim, Albugami, Mohammed, Alkhwaja, Ali, Alghamdi, Mohammed, Abahussain, Hussam, Alfawaz, Faisal, Almurayh, Abdullah, Min-Allah, Nasro
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3
cites cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3
container_end_page
container_issue 10
container_start_page 5979
container_title Applied sciences
container_volume 13
creator Alkhwaja, Ibrahim
Albugami, Mohammed
Alkhwaja, Ali
Alghamdi, Mohammed
Abahussain, Hussam
Alfawaz, Faisal
Almurayh, Abdullah
Min-Allah, Nasro
description Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.
doi_str_mv 10.3390/app13105979
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A752310889</galeid><doaj_id>oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820</doaj_id><sourcerecordid>A752310889</sourcerecordid><originalsourceid>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURB0Z78AwGPUs3HZjc51voJgj3Yo4QxH2vq7qYmKcV_b7QiTg4THvPePOZV1SnBF4xJfAnrNWEEc9nKveqI4raZspq0-__-h9UkpRUuJQkTBB9VLwtIaRuiQfMI-t2PHdr6_Iau4iZbdBuitmjWdyEWcEAwGnTtdfZhhPiJZjkXDlqmb9oCIvS97dEihi7CMBTwpDpw0Cc7-e3H1fL25nl-P318unuYzx6nusYsTxvDauMoEwIay3XrJG40xy1muGEtIRJbRqkzjjjmXnHTaEo4OEm4bbnmwI6rh52uCbBS6-iHYk8F8OoHCLFTELPXvVXUCFNuxIlocM1ftbAgKa8lrYXWguKidbbTWsfwsbEpq1XYxLHYV1QIUjNR9papi91UB0XUjy7kcr_yjB28DqN1vuCzltMSiRCyEM53BB1DStG6P5sEq-_81L_82BfYA4sc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2881438915</pqid></control><display><type>article</type><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><source>Publicly Available Content (ProQuest)</source><creator>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</creator><creatorcontrib>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</creatorcontrib><description>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app13105979</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; brute force algorithm ; Dictionaries ; dictionary attack ; Hashcat ; Multiprocessing ; Network security ; Optimization techniques ; parallel computing ; Parallel processing ; Parallel programming ; password cracking ; Passwords ; Power ; R&amp;D ; Research &amp; development ; Safety and security measures ; Security management ; Semiconductor industry</subject><ispartof>Applied sciences, 2023-05, Vol.13 (10), p.5979</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</citedby><cites>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</cites><orcidid>0009-0008-4637-3298 ; 0009-0008-0161-3200 ; 0000-0003-3471-4987 ; 0009-0004-4273-9791</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2881438915/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2881438915?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,74998</link.rule.ids></links><search><creatorcontrib>Alkhwaja, Ibrahim</creatorcontrib><creatorcontrib>Albugami, Mohammed</creatorcontrib><creatorcontrib>Alkhwaja, Ali</creatorcontrib><creatorcontrib>Alghamdi, Mohammed</creatorcontrib><creatorcontrib>Abahussain, Hussam</creatorcontrib><creatorcontrib>Alfawaz, Faisal</creatorcontrib><creatorcontrib>Almurayh, Abdullah</creatorcontrib><creatorcontrib>Min-Allah, Nasro</creatorcontrib><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><title>Applied sciences</title><description>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</description><subject>Access control</subject><subject>Algorithms</subject><subject>brute force algorithm</subject><subject>Dictionaries</subject><subject>dictionary attack</subject><subject>Hashcat</subject><subject>Multiprocessing</subject><subject>Network security</subject><subject>Optimization techniques</subject><subject>parallel computing</subject><subject>Parallel processing</subject><subject>Parallel programming</subject><subject>password cracking</subject><subject>Passwords</subject><subject>Power</subject><subject>R&amp;D</subject><subject>Research &amp; development</subject><subject>Safety and security measures</subject><subject>Security management</subject><subject>Semiconductor industry</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURB0Z78AwGPUs3HZjc51voJgj3Yo4QxH2vq7qYmKcV_b7QiTg4THvPePOZV1SnBF4xJfAnrNWEEc9nKveqI4raZspq0-__-h9UkpRUuJQkTBB9VLwtIaRuiQfMI-t2PHdr6_Iau4iZbdBuitmjWdyEWcEAwGnTtdfZhhPiJZjkXDlqmb9oCIvS97dEihi7CMBTwpDpw0Cc7-e3H1fL25nl-P318unuYzx6nusYsTxvDauMoEwIay3XrJG40xy1muGEtIRJbRqkzjjjmXnHTaEo4OEm4bbnmwI6rh52uCbBS6-iHYk8F8OoHCLFTELPXvVXUCFNuxIlocM1ftbAgKa8lrYXWguKidbbTWsfwsbEpq1XYxLHYV1QIUjNR9papi91UB0XUjy7kcr_yjB28DqN1vuCzltMSiRCyEM53BB1DStG6P5sEq-_81L_82BfYA4sc</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Alkhwaja, Ibrahim</creator><creator>Albugami, Mohammed</creator><creator>Alkhwaja, Ali</creator><creator>Alghamdi, Mohammed</creator><creator>Abahussain, Hussam</creator><creator>Alfawaz, Faisal</creator><creator>Almurayh, Abdullah</creator><creator>Min-Allah, Nasro</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0008-4637-3298</orcidid><orcidid>https://orcid.org/0009-0008-0161-3200</orcidid><orcidid>https://orcid.org/0000-0003-3471-4987</orcidid><orcidid>https://orcid.org/0009-0004-4273-9791</orcidid></search><sort><creationdate>20230501</creationdate><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><author>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>brute force algorithm</topic><topic>Dictionaries</topic><topic>dictionary attack</topic><topic>Hashcat</topic><topic>Multiprocessing</topic><topic>Network security</topic><topic>Optimization techniques</topic><topic>parallel computing</topic><topic>Parallel processing</topic><topic>Parallel programming</topic><topic>password cracking</topic><topic>Passwords</topic><topic>Power</topic><topic>R&amp;D</topic><topic>Research &amp; development</topic><topic>Safety and security measures</topic><topic>Security management</topic><topic>Semiconductor industry</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alkhwaja, Ibrahim</creatorcontrib><creatorcontrib>Albugami, Mohammed</creatorcontrib><creatorcontrib>Alkhwaja, Ali</creatorcontrib><creatorcontrib>Alghamdi, Mohammed</creatorcontrib><creatorcontrib>Abahussain, Hussam</creatorcontrib><creatorcontrib>Alfawaz, Faisal</creatorcontrib><creatorcontrib>Almurayh, Abdullah</creatorcontrib><creatorcontrib>Min-Allah, Nasro</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Directory of Open Access Journals</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alkhwaja, Ibrahim</au><au>Albugami, Mohammed</au><au>Alkhwaja, Ali</au><au>Alghamdi, Mohammed</au><au>Abahussain, Hussam</au><au>Alfawaz, Faisal</au><au>Almurayh, Abdullah</au><au>Min-Allah, Nasro</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</atitle><jtitle>Applied sciences</jtitle><date>2023-05-01</date><risdate>2023</risdate><volume>13</volume><issue>10</issue><spage>5979</spage><pages>5979-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app13105979</doi><orcidid>https://orcid.org/0009-0008-4637-3298</orcidid><orcidid>https://orcid.org/0009-0008-0161-3200</orcidid><orcidid>https://orcid.org/0000-0003-3471-4987</orcidid><orcidid>https://orcid.org/0009-0004-4273-9791</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2076-3417
ispartof Applied sciences, 2023-05, Vol.13 (10), p.5979
issn 2076-3417
2076-3417
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820
source Publicly Available Content (ProQuest)
subjects Access control
Algorithms
brute force algorithm
Dictionaries
dictionary attack
Hashcat
Multiprocessing
Network security
Optimization techniques
parallel computing
Parallel processing
Parallel programming
password cracking
Passwords
Power
R&D
Research & development
Safety and security measures
Security management
Semiconductor industry
title Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A39%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Password%20Cracking%20with%20Brute%20Force%20Algorithm%20and%20Dictionary%20Attack%20Using%20Parallel%20Programming&rft.jtitle=Applied%20sciences&rft.au=Alkhwaja,%20Ibrahim&rft.date=2023-05-01&rft.volume=13&rft.issue=10&rft.spage=5979&rft.pages=5979-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app13105979&rft_dat=%3Cgale_doaj_%3EA752310889%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2881438915&rft_id=info:pmid/&rft_galeid=A752310889&rfr_iscdi=true