Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit

被引:3
作者
Eum, Siwoo [1 ]
Kim, Hyunjun [1 ]
Song, Minho [1 ]
Seo, Hwajeong [1 ]
机构
[1] Hansung Univ, Div IT Convergence Engn, Seoul 02876, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 16期
关键词
Argon2; password hash function; GPU; optimized implementation; cracking;
D O I
10.3390/app13169295
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In modern information technology systems, secure storage and transmission of personal and sensitive data are recognized as important tasks. These requirements are achieved through secure and robust encryption methods. Argon2 is an advanced cryptographic algorithm that emerged as the winner in the Password Hashing Competition (PHC), offering a concrete and secure measure. Argon2 also provides a secure mechanism against side-channel attacks and cracking attacks using parallel processing (e.g., GPU). In this paper, we analyze the existing GPU-based implementation of the Argon2 algorithm and further optimize the implementation by improving the performance of the hashing function during the computation process. The proposed method focuses on enhancing performance by distributing tasks between CPU and GPU units, reducing the data transfer cost for efficient GPU-based parallel processing. By shifting several stages from the CPU to the GPU, the data transfer cost is significantly reduced, resulting in faster processing times, particularly when handling a larger number of passwords and higher levels of parallelism. Additionally, we optimize the utilization of the GPU's shared memory, which enhances memory access speed, especially in the computation of the hash value generation process. Furthermore, we leverage the parallel processing capabilities of the GPU to perform efficient brute-force attacks. By computing the H function on the GPU, the proposed implementation can generate initial blocks for multiple inputs in a single operation, making brute-force attacks in an efficient way. The proposed implementation outperforms existing methods, especially when processing a larger number of passwords and operating at higher levels of parallelism.
引用
收藏
页数:16
相关论文
共 18 条
[1]   Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming [J].
Alkhwaja, Ibrahim ;
Albugami, Mohammed ;
Alkhwaja, Ali ;
Alghamdi, Mohammed ;
Abahussain, Hussam ;
Alfawaz, Faisal ;
Almurayh, Abdullah ;
Min-Allah, Nasro .
APPLIED SCIENCES-BASEL, 2023, 13 (10)
[2]   Argon2: new generation of memory-hard functions for password hashing and other applications [J].
Biryukov, Alex ;
Dinu, Daniel ;
Khovratovich, Dmitry .
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, :292-302
[3]  
Chen L., 2022, P 21 INT S HIGH PERF, P199
[4]   Fast Implementation of SHA-3 in GPU Environment [J].
Choi, Hojin ;
Seo, Seog Chung .
IEEE ACCESS, 2021, 9 :144574-144586
[5]  
CUDA, C PROGR GUID V6 0
[6]  
Ertaul Levent., 2016, Proceedings of the International Conference on Wireless Networks, P66
[7]   Benchmarking the GPU memory at the warp level [J].
Fang, Minquan ;
Fang, Jianbin ;
Zhang, Weimin ;
Zhou, Haifang ;
Liao, Jianxing ;
Wang, Yuangang .
PARALLEL COMPUTING, 2018, 71 :23-41
[8]  
github, GPU IS UNFR WEBDOLLA
[9]  
Hatzivasilis G., 2015, CRYPTOL EPRINT ARCH
[10]   Distributed password cracking with BOINC and hashcat [J].
Hranicky, Radek ;
Zobal, Lukas ;
Rysavy, Ondrej ;
Kolar, Dusan .
DIGITAL INVESTIGATION, 2019, 30 :161-172