skip to main content
10.1145/1852611.1852617acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Password recovery for encrypted ZIP archives using GPUs

Published: 27 August 2010 Publication History

Abstract

Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of such documents mainly depends on two factors: the size of the password search space and the computing power of the underline system. In this paper, we present an approach using modern multi-core graphic processing units (GPUs) as computing devices for finding lost passwords of ZIP archives. The combination of GPU's extremely high computing power and the state-of-the-art password structure analysis methods would bring us a feasible solution for recovering ZIP file password. We first apply password generation rules[9] in generating a reasonable password space, and then use GPUs for exhaustively verifying every password in the space. The experimental results have shown that the password verification speed increases about from 48 to 170 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 Ghz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.

References

[1]
F. I. P. S. P. 197. Advanced encryption standard (aes), 2001.
[2]
N. T. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations, 2002. Preprint is available at http://eprint.iacr.org/2002/044/.
[3]
P. Dung, D. Tan, P. Phong, N. Duc, and N. Thuy. Applying cuda computing technology in the problem of recovering zip file password. In FAIR09: Proceedings of the 4th National Symposium of Fundamental and Applied Information Technology Research, 2009.
[4]
E. F. Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O'Reilly & Associates, Inc., 1998.
[5]
D. Kahn. The Codebreakers - The Story of Secret Writing. 1967.
[6]
A. Klein. Attacks on the rc4 stream cipher. Des. Codes Cryptography, 48(3):269--286, 2008.
[7]
NVIDIA. http://www.nvidia.com/object/cuda_home_new.html.
[8]
PKWARE. Zip file format specification, 2007.
[9]
M. Weir, S. Aggarwal, B. d. Medeiros, and B. Glodek. Password cracking using probabilistic context-free grammars. In SP09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pages 391--405, Washington, DC, USA, 2009. IEEE Computer Society.

Cited By

View all
  • (2018)Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform2018 16th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2018.8514159(1-10)Online publication date: Aug-2018
  • (2015)Optimized Password Recovery for Encrypted RAR on GPUsProceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems10.1109/HPCC-CSS-ICESS.2015.270(591-598)Online publication date: 24-Aug-2015
  • (2011)A dynamic load balance on GPU cluster for fork-join search2011 IEEE International Conference on Cloud Computing and Intelligence Systems10.1109/CCIS.2011.6045138(592-596)Online publication date: Sep-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SoICT '10: Proceedings of the 1st Symposium on Information and Communication Technology
August 2010
186 pages
ISBN:9781450301053
DOI:10.1145/1852611
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GPU
  2. ZIP
  3. password recovery

Qualifiers

  • Research-article

Conference

SoICT '10

Acceptance Rates

Overall Acceptance Rate 147 of 318 submissions, 46%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform2018 16th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2018.8514159(1-10)Online publication date: Aug-2018
  • (2015)Optimized Password Recovery for Encrypted RAR on GPUsProceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems10.1109/HPCC-CSS-ICESS.2015.270(591-598)Online publication date: 24-Aug-2015
  • (2011)A dynamic load balance on GPU cluster for fork-join search2011 IEEE International Conference on Cloud Computing and Intelligence Systems10.1109/CCIS.2011.6045138(592-596)Online publication date: Sep-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media