Vulnerabilities / Threats
8/16/2010
01:37 PM
Connect Directly
RSS
E-Mail
50%
50%

Passwords Quickly Hacked With PC Graphics Cards

Georgia Tech researchers find that high-end, readily available graphics processing units are powerful enough to easily crack secret codes.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Passwords with fewer than 12 characters can be quickly brute-force decoded using a PC graphics processing unit (GPU) that costs just a few hundred dollars, according to researchers at the Georgia Institute of Technology.

"We've been using a commonly available graphics processor to test the integrity of typical passwords of the kind in use here at Georgia Tech and many other places," said Richard Boyd, a senior research scientist at the university's research institute, in a statement. "Right now we can confidently say that a seven-character password is hopelessly inadequate."

Today's top graphics processors offer about two teraflops of parallel processing power. For comparison, "in the year 2000, the world's fastest supercomputer, a cluster of linked machines costing $110 million, operated at slightly more than 7 teraflops," he said.

The barrier to using multi-core graphics processors -- available from Nvidia or AMD's ATI division -- for compute-intensive processes other than graphics processing, said Boyd, first fell in 2007, when Nvidia released a C-based software development kit. "Once Nvidia did that, interest in GPUs really started taking off," he said. "If you can write a C program, you can program a GPU now." Or use it to crack a password.

Furthermore, thanks to Moore's Law, graphics processors continue to increase in power, which means that GPUs will get better, not worse, at cracking passwords.

But who needs a graphics processor? People often create and rely on simple passwords, and many websites use passwords more for psychological than security purposes.

But the Georgia Tech research underscores the importance of getting people to adopt longer, non-simple passwords to make them safer against attack. "Length is a major factor in protecting against 'brute forcing' a password," according to one research scientist involved in the project, Joshua Davis. "A computer keyboard contains 95 characters, and every time you add another character, your protection goes up exponentially, by 95 times."

For the record, to defend against GPU attacks, the password researchers recommend using sentence-length passwords that mix letters with numbers or symbols, and which are at least 12 characters long.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
ANON1241631011972
50%
50%
ANON1241631011972,
User Rank: Apprentice
11/1/2011 | 6:35:42 PM
re: Passwords Quickly Hacked With PC Graphics Cards
I think this article overstates the capabilities and the use case does not generally exist in the real world. Passwords do not exist in a cyberspace vacuum, just waiting to be attacked in isolation. They exist in combination with a user identifier and a challenge/response system behind a UI. While the brute force methods may be capable of generating all the possible combinations, they still have to test them against a validation challenge with the correct response set. Most password challenge systems have two additional inhibitors against brute force attacks: 1. They don't respond at GPU speeds 2. They usually disable the account after 3 to 5 failed attempts. So, unless the brute force program has the password database available and the appropriate decode algorithms to provide the correct challenge/response patterns, it will not succeed. If the attacker has that kind of access, he or she is already past the firewall and well into the bowels of the network.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5316
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in Dotclear before 2.6.4 allows remote attackers to inject arbitrary web script or HTML via a crafted page.

CVE-2014-5320
Published: 2014-09-21
The Bump application for Android does not properly handle implicit intents, which allows attackers to obtain sensitive owner-name information via a crafted application.

CVE-2014-5321
Published: 2014-09-21
FileMaker Pro before 13 and Pro Advanced before 13 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2319...

CVE-2014-5322
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in the Instant Web Publish function in FileMaker Pro before 13 and Pro Advanced before 13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-3640.

CVE-2014-6602
Published: 2014-09-21
Microsoft Asha OS on the Microsoft Mobile Nokia Asha 501 phone 14.0.4 allows physically proximate attackers to bypass the lock-screen protection mechanism, and read or modify contact information or dial arbitrary telephone numbers, by tapping the SOS Option and then tapping the Green Call Option.

Best of the Web
Dark Reading Radio