Brute force attack on UNIX passwords with SIMD computer

  • Authors:
  • Gershon Kedem;Yuriko Ishihara

  • Affiliations:
  • Computer Science Department, Duke University, Durham, NC;Computer Science Department, Duke University, Durham, NC

  • Venue:
  • SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to "crack" a large fraction of passwords used in practice [12] in 2-3 days of computation. We explain how a SIMD machine built in today's technology could "crack" any UNIX password in two days. We also describe in this paper a simple modification to the UNIX password scheme that makes it harder to break encrypted passwords using dictionary and brute force attack, thus extending the useful life of the UNIX password scheme. The modified password scheme is compatible with the existing password scheme.