Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDA

  • Conference paper
  • First Online:
Cloud Computing (CloudComp 2014)

Abstract

Message Digest 5 (MD5) is an algorithm to produce a MAC (message authentication code), which has been specified for use in Internet Protocol Security [1]. There exists a large computational complexity in cracking the MD5 hash; hence, implementations on common computing systems become less practical. CUDA (Compute Unified Device Architecture) is a parallel computing platform and programming model invented by NVIDIA. It enables dramatic increases in computing performance by harnessing the power of the graphics processing unit (GPU). This paper puts forward a CUDA-based algorithm and its comprehensive optimizations for cracking the MD5 hash. The experimental results have shown that the peek speed of checking passwords based on GPU reaches 987 Mkey/s, which is 5470 times of that in CPU. It presents an efficient implementation for cracking the MD5 passwords through GPU; meanwhile, these results have demonstrated the potential applicability of GPU in the field of cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 39.58
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 51.36
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. http://en.wikipedia.org/wiki/MD5

  2. NVIDIA Corporation, NVIDIA CUDA Programming Guide V6.0

    Google Scholar 

  3. NVIDIA Corporation, NVIDIA CUDA C Best Practices Guide V6.0

    Google Scholar 

  4. Li, C., Wu, H.: Efficient implementation for MD5-RC4 encryption using GPU with CUDA. In: The 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, August 2009

    Google Scholar 

  5. Wang, F., Yang, C., Wu, Q., Shi, Z.: Constant memory optimizations in MD5 crypt cracking algorithm on GPU-accelerated supercomputer using CUDA. In: 2012 7th International Conference on Computer Science & Education, pp. 638–642. IEEE (2012)

    Google Scholar 

  6. NVIDIA Corporation, NVIDIA CUDA Runtime API V6.0

    Google Scholar 

  7. Nguyen, D.H., Nguyen, T.T., Duong, T. N., et al.: Cryptanalysis of MD5 on GPU cluster. In: 2010 International Conference on Information Security & Artificial Intelligence (ISAI 2010). Chengdu, China, pp. 910–914. IEEE (2010)

    Google Scholar 

Download references

Acknowledgements

This study is supported by the National Natural Science Foundation of China (Grant No. 61103214), the key projects for science and technology of Tian** (Grant No. 13ZCZDGX01098) and the Doctoral Fund of Ministry of Education of China (Grant No. 20110031120030).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianzhong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chen, R., Zhang, Y., Zhang, J., Xu, J. (2015). Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDA. In: Leung, V., Lai, R., Chen, M., Wan, J. (eds) Cloud Computing. CloudComp 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 142. Springer, Cham. https://doi.org/10.1007/978-3-319-16050-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16050-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16049-8

  • Online ISBN: 978-3-319-16050-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation