Abstract
Hash-based authentication is a widespread technique for protecting passwords in many modern software systems including databases. A hashing function is a one-way mathematical function that is used in various security contexts in this domain. In this paper, we revisit three popular hashing algorithms (MD5, SHA-1, and NTLM), that are considered weak or insecure. More specifically, we explore the performance of the hashing algorithms on different hardware platforms, from expensive high-end GPUs found in data centers and high-performance computing centers to relatively cheaper consumer-grade ones found in the homes of end-users. In parallel, we observe the behavior of different hardware platforms. Our results re-emphasize that despite their theoretical strength, the practical utilization of widely used hashing algorithms are highly insecure in many real-world scenarios; i.e., cracking a password of length 6 takes less than 6 seconds using a consumer-grade GPU.
| Originalsprog | Engelsk |
|---|---|
| Titel | International Workshop on Accelerating Analytics and Data Management Systems : ADMS’20 |
| Udgivelsessted | Tokyo, Japan |
| Publikationsdato | 31 aug. 2020 |
| Status | Udgivet - 31 aug. 2020 |
| Begivenhed | Accelerating Analytics and Data Management Systems - Tokyo, Japan Varighed: 21 aug. 2020 → 21 aug. 2020 Konferencens nummer: 11th |
Konference
| Konference | Accelerating Analytics and Data Management Systems |
|---|---|
| Nummer | 11th |
| Land/Område | Japan |
| By | Tokyo |
| Periode | 21/08/2020 → 21/08/2020 |
Emneord
- Hash-based authentication
- Hashing algorithms
- MD5
- SHA-1
- NTLM
Fingeraftryk
Dyk ned i forskningsemnerne om 'Hash-Based Authentication Revisited in the Age of High-Performance Computers'. Sammen danner de et unikt fingeraftryk.Citationsformater
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver