Password Cracker Using MPI: Project Report
Password Cracker Using MPI: Project Report
Password Cracker Using MPI: Project Report
PROJECT REPORT
By
NAME OF STUDENT REG NO
Manohar Kumar Singh 19BCE2646
Ravi Kasaudhan 19BCE2659
Sudeep Chaudhary 19BCE2661
Fall 2021-22
INTRODUCTION
In cryptanalysis and computer security, password cracking is the process of
recovering passwords from data that have been stored in or transmitted by a
computer system. A common approach (brute-force attack) is to repeatedly try
guesses for the password and to check them against an available cryptographic
hash of the password. The purpose of password cracking might be to help a user
recover a forgotten password (installing an entirely new password is less of a
security risk, but it involves System Administration privileges), to gain unauthorized
access to a system, or a preventive measure by system administrators to check for
easily crack able passwords. On a file-by-file basis, password cracking is utilized to
gain access to digital evidence to which a judge has allowed access, when a
particular file's permissions are restricted.
PROBLEM STATEMENT
In cryptanalysis and computer security, Nowadays the Data is Secured using variety
of Firewalls/Locks, Passwords and Encryption which doesn’t allow external users to
access the data. But sometimes higher security also needs breaching ethically by
which we can check the run-time analysis and analyze the Data. Real Time Examples
CONCEPT USED
➢ Parallel Cluster Programming
➢ Message Passing Interface (MPI)
➢ Hybridization
MPI
MPI (Message Passing Interface) is a standard Application Programming Interface
(API) for message passing, supporting various parallel computing architectures to
develop large scale parallel applications. The load is distributed by spawning
various processes and the communication is done via MPI and thus, a de facto
standard for distributed memory systems.
in the users’ native languages and employ the finite automata model to deal with
the non-alphabetic characters in the passwords.
LITERATURE REVIEW
S.N. TITLE AUTHOR METHODOLOGY MERITS DEMERITS
1 Recurrent Sungyup We use dictionary- To improve on This can be
GANs Nam, based attacks. The the weakness of used for
Password Seungho dictionary based these personal
Cracker For IoT Jeon, password attack can passwords, reasons to
Password Hongkyo be said to be a data password seek
Security Kim, based attack, and the strength revenge
Enhancement Jonsub definition and use of estimation and for
Moon dictionary studies other
transformation rules have been purpose
supported by Hashcat conducted to also.
and JtR can be said to recommend the
be the most basic usage of strong
data-driven expanded passwords, and
attack. organizations
such as the
National
Institute of
Standards and
Technology
(NIST)
case 6:
alphabet = "-
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
cout << endl
<< endl
<< "Couldn't find the password, increasing the searching
level." << endl
<< endl
<< "Testing lowercase, uppercase
characters(abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ) - 52 Characters,
please wait ";
break;
case 7:
alphabet = "-
0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
cout << endl
<< endl
<< "Couldn't find the password, increasing the searching
level." << endl
<< endl
<< "Testing lowercase, uppercase characters and
numbers(0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ) - 62
Characters, please wait ";
break;
}
for (digit[6] = 0; digit[6] < alphabet.length(); digit[6]++)
REFERENCES
[1] Nam, S.; Jeon, S.; Kim, H.; Moon, J. Recurrent GANs Password Cracker For
IoT Password Security Enhancement. Sensors 2020, 20, 3106
[2] E. Liu, A. Nakanishi, M. Golla, D. Cash and B. Ur, "Reasoning Analytically about
Password-Cracking Software," 2019 IEEE Symposium on Security and Privacy
(SP), San Francisco, CA, USA, 2019, pp. 380-397, doi:
10.1109/SP.2019.00070.
[3] Hranický R., Lištiak F., Mikuš D., Ryšavý O. (2019) On Practical Aspects of
PCFG Password Cracking. In: Foley S. (eds) Data and Applications Security and
Privacy XXXIII. DBSec 2019. Lecture Notes in Computer Science, vol 11559.
Springer, Cham. https://doi.org/10.1007/978-3-030-22479-0_3
[5] Nam S., Jeon S., Moon J. (2020) A New Password Cracking Model with
Generative Adversarial Networks. In: You I. (eds) Information Security
Applications. WISA 2019. Lecture Notes in Computer Science, vol 11897.
Springer, Cham. https:// doi.org/10.1007/978-3-030-39303-8_19
[6] Valois M., Lacharme P., Bars JM.L. (2019) Performance of Password Guessing
Enumerators Under Cracking Conditions. In: Dhillon G., Karlsson F.,
Hedström K., Zúquete A. (eds) ICT Systems Security and Privacy Protection.
SEC 2019. IFIP Advances in Information and Communication Technology, vol
562. Springer, Cham. https://doi.org/10.1007/978-3-030-22312-0_5
[7] Rudy J., Rodwald P. (2020) Job Scheduling with Machine Speeds for Password
Cracking Using Hashtopolis. In: Zamojski W., Mazurkiewicz J., Sugier J.,
Walkowiak T., Kacprzyk J. (eds) Theory and Applications of Dependable
Computer Systems. DepCoS-RELCOMEX 2020. Advances in Intelligent
Systems and