Skip to main content

Advertisement

Log in

An efficient heterogeneous parallel password recovery system on MT-3000

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Password-based recovery is a widely used method for regaining access to applications or services when passwords are lost or forgotten. It is commonly used in electronic forensics by law enforcement agencies, information acquisition in the commercial sector, and data recovery for individuals. However, as encryption algorithms and complex passwords become more prevalent for security purposes, traditional CPU-based and GPU-based password recovery systems are struggling to meet the time-sensitive requirements for deciphering, and there is an urgent need for a more efficient password recovery system. Therefore, this paper presents an efficient heterogeneous parallel password recovery system based on the MT-3000 multi-zone processor. According to the architectural features of MT-3000, this system adopts a heterogeneous multi-level parallelism strategy, including inter-acceleration cluster data parallelism through MPI, intra-acceleration core data parallelism through the hthreads APIs, and instruction-level parallelism through a very long instruction word manner. Additionally, this system utilizes a unified task allocation mechanism that assigns the initialization and comparison verification tasks to the CPU side, while the accelerator side executes the hash iteration. This approach ensures that the system achieves optimal performance while maintaining its efficiency. The experimental analysis and results confirm that the proposed system significantly improves the recovery efficiency compared to traditional CPU-based and GPU-based systems, and also has an advantage in deciphering speed compared to the most popular hybrid CPU-FPGA-based system. Furthermore, it offers superior scalability, allowing for expansion to more compute nodes, making it a good solution for large-scale password recovery needs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 1:
Fig. 8
Algorithm 2:
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

No datasets were generated or analyzed during the current study.

References

  1. Ignacio V, Angélica C, Alfonso R (2018) Authentication schemes and methods: a systematic literature review. Inf Softw Technol 94:30–37

    Article  Google Scholar 

  2. O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. In proceedings of the IEEE 91(12):2021–2040

    Article  Google Scholar 

  3. Bošnjak L, Sreš J, Brumen B (2018) Brute-force and dictionary attack on hashed real-world passwords. In proceedings of 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO '18), Opatija, Croatia, 2018, 1161–1166. https://doi.org/10.23919/MIPRO.2018.8400211

  4. Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In proceedings of the 12th ACM conference on Computer and communications security. pp. 364–372. https://doi.org/10.1145/1102120.1102168

  5. Xie Z, Shi F, Zhang M, Ma H, Wang H, Li Z, Zhang Y (2024) GuessFuse: hybrid password guessing with multi-view. IEEE Trans Inf Forens Security. https://doi.org/10.1109/TIFS.2024.3376246

    Article  Google Scholar 

  6. Melicher W, Ur B, Segreti SM, Komanduri S, Bauer L, Christin N, Cranor LF (2016) Fast, lean, and accurate: modeling password guessability using neural networks. In proceedings of the 25th USENIX Security Symposium (USENIX Security 16). pp. 175–191

  7. Zhang Z, Liu P, Wang W, Jiang Y (2022) RUPA: a high performance, energy efficient accelerator for rule-based password generation in heterogenous password recovery system. IEEE Trans Comput 72(4):900–913

    Article  Google Scholar 

  8. Zeng H, Prasanna V (2020) GraphACT: Accelerating GCN training on CPU-FPGA heterogeneous platforms. In proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. pp. 255–265

  9. Ma R, Liu C, Zheng Z, Gechter F, Briois P, Gao F (2018) CPU-FPGA based real-time simulation of fuel cell electric vehicle. Energy Convers Manage 174:983–997

    Article  Google Scholar 

  10. Liu P, Li S, Ding Q (2018) An energy-efficient accelerator based on hybrid CPU-FPGA devices for password recovery. IEEE Trans Comput 68(2):170–181

    Article  MathSciNet  Google Scholar 

  11. Lu K, Wang Y, Guo Y, Huang C, Liu S, Wang R, Fang J, Tang T, Chen Z, Liu B (2022) MT-3000: a heterogeneous multi-zone processor for HPC. CCF Trans High Perform Comput 4(2):150–164

    Article  Google Scholar 

  12. Li R, Liu J, Zhang G, Gong C, Yang B, Liang Y (2023) An efficient heterogeneous parallel algorithm of the 3D MOC for multizone heterogeneous systems. Comput Phys Commun 292:108806

    Article  Google Scholar 

  13. Li J, Gu H, Zhao J, Qiao L, Gong C, Zheng G (2024) Transplantation and optimization of molecular dynamics simulation on MT-3000. Futur Gener Comput Syst 153:262–275

    Article  Google Scholar 

  14. Fu H, Liao J, Yang J, Wang L, Song Z, Huang X, Yang C, Xue W, Liu F, Qiao F (2016) The Sunway TaihuLight supercomputer: system and applications. SCIENCE CHINA Inf Sci 59:1–16

    Article  Google Scholar 

  15. Fang J, Zhang P, Huang C, Tang T, Lu K, Wang R, Wang Z (2023) Programming bare-metal accelerators with heterogeneous threading models: a case study of matrix-3000. Frontiers Inf Technol Electron Eng 24(4):509–520

    Article  Google Scholar 

  16. Zhang Z (2020) Liu P (2020) A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords. IACR Trans Cryptograph Hardw Embed Syst 4:1–23

    Google Scholar 

  17. Pham HL, Tran TH, Le Duong VT, Nakashima Y (2022) A high-efficiency FPGA-based multimode SHA-2 accelerator. IEEE Access 10:11830–11845

    Article  Google Scholar 

  18. Zodpe H, Sapkal A (2020) An efficient AES implementation using FPGA with enhanced security features. J King Saud Univ-Eng Sci 32(2):115–122

    Google Scholar 

  19. Choi H, Seo SC (2021) Fast implementation of SHA-3 in GPU environment. IEEE Access 9:144574–144586

    Article  Google Scholar 

  20. Hajihassani O, Monfared SK, Khasteh SH, Gorgin S (2019) Fast AES implementation: a high-throughput bitsliced approach. IEEE Trans Parallel Distrib Syst 30(10):2211–2222

    Article  Google Scholar 

  21. Li L, Fang J, Jiang J, Gan L, Zheng W, Fu H, Yang G (2020) Efficient AES implementation on Sunway TaihuLight supercomputer: a systematic approach. J Parallel and Distrib Comput 138:178–189

    Article  Google Scholar 

  22. Wang Z, Dong X, Kang Y, Chen H (2023) Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. J Supercomput 79(2):2332–2355

    Article  Google Scholar 

  23. Li H, Han L, Tao H, Dong B (2022) Study on office password recovery vectorization technology based on Sunway many-core processor. Computer Science 49(S2):745–749

    Google Scholar 

  24. Hashcat-advanced password recovery. https://hashcat.net/hashcat. Accessed 14 Sep 2024

  25. Li B, Zhou Q, Si X (2018) A hybrid heterogeneous password recovery system. Chinese J Comput 41(12):2804–2822

    Google Scholar 

  26. Li B, Feng F, Chen X, Cao Y (2021) Reconfigurable and high-efficiency password recovery algorithms based on HRCA. IEEE Access 9:18085–18111

    Article  Google Scholar 

  27. Li B, Zhou Q, Cao Y, Si X (2022) Cognitively reconfigurable mimic-based heterogeneous password recovery system. Comput Secur 16:102667

    Article  Google Scholar 

  28. Weir M, Aggarwal S, De Medeiros B, B Glodek B (2009) Password cracking using probabilistic context-free grammars. In proceedings of 30th IEEE symposium on security and privacy. pp: 391–405

  29. Wang D, Wang P (2015) The emperor’s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Pernul G, Ryan PYA, Weippl E (eds) Computer security -- ESORICS 2015: 20th European symposium on research in computer security, Vienna, Austria, Proceedings, Part II. Springer International Publishing, Cham, pp 456–477. https://doi.org/10.1007/978-3-319-24177-7_23

    Chapter  Google Scholar 

  30. Han W, Xu M, Zhang J, Wang C, Zhang K, Wang X (2020) TransPCFG: transferring the grammars from short passwords to guess long passwords effectively. IEEE Trans Inf Forensics Secur 16:451–465

    Article  Google Scholar 

  31. Hitaj B, Gasti P, Ateniese G, Perez-Cruz F (2019) PassGAN: a deep learning approach for password guessing. In: Deng RH, Gauthier-Umaña V, Ochoa M, Yung M (eds) Applied cryptography and network security: 17th International Conference, ACNS 2019, Bogota, Colombia, Proceedings. Springer International Publishing, Cham, pp 217–237. https://doi.org/10.1007/978-3-030-21568-2_11

    Chapter  Google Scholar 

  32. Wang D, Zou Y, Zhang Z, Xiu K (2023) Password guessing using random forest. In proceedings of the 32nd USENIX Security Symposium (USENIX Security 23). pp: 965–982

  33. Xu M, Yu J, Zhang X, Wang C, Zhang S, Wu H, Han W (2023) Improving real-world password guessing attacks via bi-directional transformers.In proceedings of the 32nd USENIX Security Symposium (USENIX Security 23). pp: 1001–1018

  34. Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf’s law in passwords. IEEE Trans Inf Forensics Secur 12(11):2776–2791

    Article  Google Scholar 

  35. Hou Z, Wang D (2022) New Observations on Zipf’s Law in passwords. IEEE Trans Inf Forensics Secur 18:517–532

    Article  Google Scholar 

  36. Luo Y, Liu J, Xiao T, Gong C (2023) Parallel Implementation of SHA256 on Multizone Heterogeneous Systems. IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). pp. 416–422. https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00087

  37. Markus K, Markus M, Daniel B, Christian K, Wolfgang K (2016) Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. In: international conference on cryptographic hardware and embedded systems -CHES 2016. Springer. pp. 559–577

  38. Johnson T, Roggow D, Jones PH, Zambreno J (2015) An FPGA architecture for the recovery of WPA/WPA2 keys. J Circuits Syst Comput 24(7):1–26

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially supported by grants from the National Key Research and Development Program of China (2021YFB0300101) and the National Natural Science Foundation of China (62032023, 42104078, 6190241). The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.

Funding

Funding for this study was received from the National Key Research and Development Program of China, 2021YFB0300101, and the National Natural Science Foundation of China, 62032023, 42104078, 6190241.

Author information

Authors and Affiliations

Authors

Contributions

L.Y.T was responsible for manuscript writing, experimental method design, research, and data analysis; L.J and G.C.Y were responsible for validation and verification, supervision, and guidance; and L.T was responsible for guidance and textual revisions. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Chunye Gong.

Ethics declarations

Confict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, Y., Liu, J., Gong, C. et al. An efficient heterogeneous parallel password recovery system on MT-3000. J Supercomput 81, 38 (2025). https://doi.org/10.1007/s11227-024-06532-9

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06532-9

Keywords