usenix conference policies
Brute Force Attack on UNIX Passwords with SIMD Computer
As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to "crack" a large fraction of passwords used in practice [12] in 2-3 days of computation. We explain how a SIMD machine built in today's technology could "crack" any UNIX password in two days. We also describe in this paper a simple modification to the UNIX password scheme that makes it harder to break encrypted passwords using dictionary and brute force attack, thus extending the useful life of the UNIX password scheme. The modified password scheme is compatible with the existing password scheme.
author = {Gershon Kedem and Yuriko Ishihara},
title = {Brute Force Attack on {UNIX} Passwords with {SIMD} Computer},
booktitle = {8th USENIX Security Symposium (USENIX Security 99)},
year = {1999},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/8th-usenix-security-symposium/brute-force-attack-unix-passwords-simd-computer},
publisher = {USENIX Association},
month = aug
}
connect with us