Loading…
Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming
Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in differen...
Saved in:
Published in: | Applied sciences 2023-05, Vol.13 (10), p.5979 |
---|---|
Main Authors: | , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3 |
---|---|
cites | cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3 |
container_end_page | |
container_issue | 10 |
container_start_page | 5979 |
container_title | Applied sciences |
container_volume | 13 |
creator | Alkhwaja, Ibrahim Albugami, Mohammed Alkhwaja, Ali Alghamdi, Mohammed Abahussain, Hussam Alfawaz, Faisal Almurayh, Abdullah Min-Allah, Nasro |
description | Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords. |
doi_str_mv | 10.3390/app13105979 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A752310889</galeid><doaj_id>oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820</doaj_id><sourcerecordid>A752310889</sourcerecordid><originalsourceid>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXURB0Z78AwGPUs3HZjc51voJgj3Yo4QxH2vq7qYmKcV_b7QiTg4THvPePOZV1SnBF4xJfAnrNWEEc9nKveqI4raZspq0-__-h9UkpRUuJQkTBB9VLwtIaRuiQfMI-t2PHdr6_Iau4iZbdBuitmjWdyEWcEAwGnTtdfZhhPiJZjkXDlqmb9oCIvS97dEihi7CMBTwpDpw0Cc7-e3H1fL25nl-P318unuYzx6nusYsTxvDauMoEwIay3XrJG40xy1muGEtIRJbRqkzjjjmXnHTaEo4OEm4bbnmwI6rh52uCbBS6-iHYk8F8OoHCLFTELPXvVXUCFNuxIlocM1ftbAgKa8lrYXWguKidbbTWsfwsbEpq1XYxLHYV1QIUjNR9papi91UB0XUjy7kcr_yjB28DqN1vuCzltMSiRCyEM53BB1DStG6P5sEq-_81L_82BfYA4sc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2881438915</pqid></control><display><type>article</type><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><source>Publicly Available Content (ProQuest)</source><creator>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</creator><creatorcontrib>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</creatorcontrib><description>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app13105979</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; brute force algorithm ; Dictionaries ; dictionary attack ; Hashcat ; Multiprocessing ; Network security ; Optimization techniques ; parallel computing ; Parallel processing ; Parallel programming ; password cracking ; Passwords ; Power ; R&D ; Research & development ; Safety and security measures ; Security management ; Semiconductor industry</subject><ispartof>Applied sciences, 2023-05, Vol.13 (10), p.5979</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</citedby><cites>FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</cites><orcidid>0009-0008-4637-3298 ; 0009-0008-0161-3200 ; 0000-0003-3471-4987 ; 0009-0004-4273-9791</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2881438915/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2881438915?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,74998</link.rule.ids></links><search><creatorcontrib>Alkhwaja, Ibrahim</creatorcontrib><creatorcontrib>Albugami, Mohammed</creatorcontrib><creatorcontrib>Alkhwaja, Ali</creatorcontrib><creatorcontrib>Alghamdi, Mohammed</creatorcontrib><creatorcontrib>Abahussain, Hussam</creatorcontrib><creatorcontrib>Alfawaz, Faisal</creatorcontrib><creatorcontrib>Almurayh, Abdullah</creatorcontrib><creatorcontrib>Min-Allah, Nasro</creatorcontrib><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><title>Applied sciences</title><description>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</description><subject>Access control</subject><subject>Algorithms</subject><subject>brute force algorithm</subject><subject>Dictionaries</subject><subject>dictionary attack</subject><subject>Hashcat</subject><subject>Multiprocessing</subject><subject>Network security</subject><subject>Optimization techniques</subject><subject>parallel computing</subject><subject>Parallel processing</subject><subject>Parallel programming</subject><subject>password cracking</subject><subject>Passwords</subject><subject>Power</subject><subject>R&D</subject><subject>Research & development</subject><subject>Safety and security measures</subject><subject>Security management</subject><subject>Semiconductor industry</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXURB0Z78AwGPUs3HZjc51voJgj3Yo4QxH2vq7qYmKcV_b7QiTg4THvPePOZV1SnBF4xJfAnrNWEEc9nKveqI4raZspq0-__-h9UkpRUuJQkTBB9VLwtIaRuiQfMI-t2PHdr6_Iau4iZbdBuitmjWdyEWcEAwGnTtdfZhhPiJZjkXDlqmb9oCIvS97dEihi7CMBTwpDpw0Cc7-e3H1fL25nl-P318unuYzx6nusYsTxvDauMoEwIay3XrJG40xy1muGEtIRJbRqkzjjjmXnHTaEo4OEm4bbnmwI6rh52uCbBS6-iHYk8F8OoHCLFTELPXvVXUCFNuxIlocM1ftbAgKa8lrYXWguKidbbTWsfwsbEpq1XYxLHYV1QIUjNR9papi91UB0XUjy7kcr_yjB28DqN1vuCzltMSiRCyEM53BB1DStG6P5sEq-_81L_82BfYA4sc</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Alkhwaja, Ibrahim</creator><creator>Albugami, Mohammed</creator><creator>Alkhwaja, Ali</creator><creator>Alghamdi, Mohammed</creator><creator>Abahussain, Hussam</creator><creator>Alfawaz, Faisal</creator><creator>Almurayh, Abdullah</creator><creator>Min-Allah, Nasro</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0008-4637-3298</orcidid><orcidid>https://orcid.org/0009-0008-0161-3200</orcidid><orcidid>https://orcid.org/0000-0003-3471-4987</orcidid><orcidid>https://orcid.org/0009-0004-4273-9791</orcidid></search><sort><creationdate>20230501</creationdate><title>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</title><author>Alkhwaja, Ibrahim ; Albugami, Mohammed ; Alkhwaja, Ali ; Alghamdi, Mohammed ; Abahussain, Hussam ; Alfawaz, Faisal ; Almurayh, Abdullah ; Min-Allah, Nasro</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>brute force algorithm</topic><topic>Dictionaries</topic><topic>dictionary attack</topic><topic>Hashcat</topic><topic>Multiprocessing</topic><topic>Network security</topic><topic>Optimization techniques</topic><topic>parallel computing</topic><topic>Parallel processing</topic><topic>Parallel programming</topic><topic>password cracking</topic><topic>Passwords</topic><topic>Power</topic><topic>R&D</topic><topic>Research & development</topic><topic>Safety and security measures</topic><topic>Security management</topic><topic>Semiconductor industry</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alkhwaja, Ibrahim</creatorcontrib><creatorcontrib>Albugami, Mohammed</creatorcontrib><creatorcontrib>Alkhwaja, Ali</creatorcontrib><creatorcontrib>Alghamdi, Mohammed</creatorcontrib><creatorcontrib>Abahussain, Hussam</creatorcontrib><creatorcontrib>Alfawaz, Faisal</creatorcontrib><creatorcontrib>Almurayh, Abdullah</creatorcontrib><creatorcontrib>Min-Allah, Nasro</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Directory of Open Access Journals</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alkhwaja, Ibrahim</au><au>Albugami, Mohammed</au><au>Alkhwaja, Ali</au><au>Alghamdi, Mohammed</au><au>Abahussain, Hussam</au><au>Alfawaz, Faisal</au><au>Almurayh, Abdullah</au><au>Min-Allah, Nasro</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming</atitle><jtitle>Applied sciences</jtitle><date>2023-05-01</date><risdate>2023</risdate><volume>13</volume><issue>10</issue><spage>5979</spage><pages>5979-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover passwords, both approach the task in different ways. A brute force algorithm generates all possible combinations of characters in a specified range and length, while the dictionary attack checks against a predefined word list. This study compares the efficiency of these methods using parallel versions of Python, C++, and Hashcat. The results show that the NVIDIA GeForce GTX 1050 Ti with CUDA is significantly faster than the Intel(R) HD Graphics 630 GPU for cracking passwords, with a speedup of 11.5× and 10.4× for passwords with and without special characters, respectively. Special characters increase password-cracking time, making the process more challenging. The results of our implementation indicate that parallel processing greatly improves the speed of password-cracking techniques. The brute force algorithm achieved a speedup of 1.9× with six cores, while the dictionary attack showed a speedup of 4.4× with eight-core static scheduling. Studying password-cracking techniques highlights the need for stronger security measures to protect sensitive information and the vulnerability of weak passwords.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app13105979</doi><orcidid>https://orcid.org/0009-0008-4637-3298</orcidid><orcidid>https://orcid.org/0009-0008-0161-3200</orcidid><orcidid>https://orcid.org/0000-0003-3471-4987</orcidid><orcidid>https://orcid.org/0009-0004-4273-9791</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2076-3417 |
ispartof | Applied sciences, 2023-05, Vol.13 (10), p.5979 |
issn | 2076-3417 2076-3417 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_2d8d0595186045bc8ea92549248cc820 |
source | Publicly Available Content (ProQuest) |
subjects | Access control Algorithms brute force algorithm Dictionaries dictionary attack Hashcat Multiprocessing Network security Optimization techniques parallel computing Parallel processing Parallel programming password cracking Passwords Power R&D Research & development Safety and security measures Security management Semiconductor industry |
title | Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A39%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Password%20Cracking%20with%20Brute%20Force%20Algorithm%20and%20Dictionary%20Attack%20Using%20Parallel%20Programming&rft.jtitle=Applied%20sciences&rft.au=Alkhwaja,%20Ibrahim&rft.date=2023-05-01&rft.volume=13&rft.issue=10&rft.spage=5979&rft.pages=5979-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app13105979&rft_dat=%3Cgale_doaj_%3EA752310889%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c403t-6d34df2388a6e5c7f906c5070306371190e322fdf1f3fb066c215af915e75c5a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2881438915&rft_id=info:pmid/&rft_galeid=A752310889&rfr_iscdi=true |