Password Recovery for RAR Files Using CUDA

Driven by the insatiable demand of real-time graphics, especially from the market of computer games, graphics processing unit (GPU) is becoming a major computing horsepower during recent years since the performance of GPU is surpassing that of the contemporary CPU. This paper presents our study on h...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2009 International Conference on Dependable, Autonomic and Secure Computing s. 486 - 490
Hlavní autoři: Guang Hu, Jianhua Ma, Benxiong Huang
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.12.2009
Témata:
ISBN:0769539297, 9781424454204, 1424454204, 9780769539294
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Driven by the insatiable demand of real-time graphics, especially from the market of computer games, graphics processing unit (GPU) is becoming a major computing horsepower during recent years since the performance of GPU is surpassing that of the contemporary CPU. This paper presents our study on how to efficiently recover the passwords for encrypted RAR files. Our research focus is on the AES key generation processing, which is the most time consuming stage in the whole RAR encryption/decryption process. The design and implementation of the password recovery are based on NVIDIA's CUDA (computer unified device architecture). A CPU-based version is also implemented as a reference and the performance comparison with that of the GPU-based version. In addition, a modified model is proposed to estimate the performance by static analysis of code for and then further assist program optimization.
AbstractList Driven by the insatiable demand of real-time graphics, especially from the market of computer games, graphics processing unit (GPU) is becoming a major computing horsepower during recent years since the performance of GPU is surpassing that of the contemporary CPU. This paper presents our study on how to efficiently recover the passwords for encrypted RAR files. Our research focus is on the AES key generation processing, which is the most time consuming stage in the whole RAR encryption/decryption process. The design and implementation of the password recovery are based on NVIDIA's CUDA (computer unified device architecture). A CPU-based version is also implemented as a reference and the performance comparison with that of the GPU-based version. In addition, a modified model is proposed to estimate the performance by static analysis of code for and then further assist program optimization.
Author Guang Hu
Jianhua Ma
Benxiong Huang
Author_xml – sequence: 1
  surname: Guang Hu
  fullname: Guang Hu
  organization: Dept. of Electron & Inf., Huazhong Univ. of Sci. & Technol., Wuhan, China
– sequence: 2
  surname: Jianhua Ma
  fullname: Jianhua Ma
  organization: Fac. of Comput. & Inf. Sci., Hosei Univ., Tokyo, Japan
– sequence: 3
  surname: Benxiong Huang
  fullname: Benxiong Huang
  organization: Dept. of Electron & Inf., Huazhong Univ. of Sci. & Technol., Wuhan, China
BookMark eNotjEFLwzAYQCM60M4dPXnJWWj98uVLmhxL51QYKNWeR9Z8lcpcpRFl_15FT-_y3svEyX7csxAXCgqlwF8vq6e6QABfKNRHIlOERIZQ4bHIoLTeaI--nInsV_IEgO5ULFJ6BQBVWosazsTVY0jpa5yibLgbP3k6yH6cZFM1cjXsOMk2DfsXWbfL6lzM-rBLvPjnXLSrm-f6Ll8_3N7X1TofkNRH3nPvwGyDDtZq8EiA_baLBh1oFcFpHxWQpUhdIHAucok2hEDBKTKB9Vxc_n0HZt68T8NbmA4bo396D_obE6NCxQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DASC.2009.123
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424454212
9781424454211
EndPage 490
ExternalDocumentID 5380390
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IK
6IL
6IM
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i241t-fef805ba3a663092402fbcd528031d0839d10464d4ca4088de726aaa4a8145ae3
IEDL.DBID RIE
ISBN 0769539297
9781424454204
1424454204
9780769539294
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000277026000081&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:53:41 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009940028
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-fef805ba3a663092402fbcd528031d0839d10464d4ca4088de726aaa4a8145ae3
PageCount 5
ParticipantIDs ieee_primary_5380390
PublicationCentury 2000
PublicationDate 2009-12-01
PublicationDateYYYYMMDD 2009-12-01
PublicationDate_xml – month: 12
  year: 2009
  text: 2009-12-01
  day: 01
PublicationDecade 2000
PublicationTitle 2009 International Conference on Dependable, Autonomic and Secure Computing
PublicationTitleAbbrev ISDASC
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001766230
ssib026766177
Score 1.4737352
Snippet Driven by the insatiable demand of real-time graphics, especially from the market of computer games, graphics processing unit (GPU) is becoming a major...
SourceID ieee
SourceType Publisher
StartPage 486
SubjectTerms AES
Central Processing Unit
Computer architecture
Computer graphics
Coprocessors
Cryptography
CUDA
Electrons
GPU
Hardware
parallel computing
Parallel processing
password recovery
Performance analysis
Process design
Title Password Recovery for RAR Files Using CUDA
URI https://ieeexplore.ieee.org/document/5380390
WOSCitedRecordID wos000277026000081&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED21FQMToBbxLQ9MiFDHcep4rFIipqoqVOpWObYjdUlRvxD_nrOTtAwsbEmcIY7tu3c-33sAj3EubF4kNEgUEwFXFJcUIt-AChZpIR3BS-LFJsR4nMznctKC50MtjLXWHz6zL-7S5_LNSu_cVlkfFyfFGL0NbSEGVa1WM3fYQKCnqWsq_f4K3iO8riJ1GTsYIJrCrpgzymv2naaRN_xPTfuRkLM_Gr6nFbVl6GSNfsmweC-Unf3v-8-hdyznI5ODo7qAli278DRB2PyFoSdxEShO6G-C-JVMh1OSoaXYEH-YgKSz0bAHs-z1I30LauGEYIkOeRsUFv9-nKtIIZ6g0iVQilyb2ClRhQZBlzQutcsN14qjmTFWsIFSiivsf6xsdAmdclXaKyAU38HRNFQzy4XB6EhGPEFrrYsoVEpeQ9f1c_FZcWMs6i7e_P34Fk5Zrb9AwzvobNc7ew8ner9dbtYPfkB_AAaulDs
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEJ4gmuhJDRjf9uDJuNLdben2uAEJRiQEIeFGum034QKGh8Z_73Qf4MGLt91tL7N9zPd1Ot8A3PNE2CSNqBepQHhMUVxSiHw9KoJQC-kEXqKs2ITo96PJRA4q8LjNhbHWZpfP7JN7zGL5ZqE37qisgYuTIkffg33OkPfk2Vrl7AmaAn1NkVWZnbDgOwLsnKtL7oCAKFO7OAsoK_R3ykZWKkCV7TtJzkY7fm_l4pa-K2z0qxBL5oc6x_-z4ATqu4Q-Mti6qlOo2HkNHgYInL-QfBLHQXFKfxNEsGQYD0kH94oVya4TkNa4Hddh3HketbpeUTrBm6FLXnupxf_PExUqRBRUuhBKmmjDXS0q3yDsksYFd5lhWjHcaIwVQVMpxRTaz5UNz6A6X8ztORCKfXA8DdWBZcIgP5Ihi3C_1mnoKyUvoObsnH7k6hjTwsTLvz_fwWF39Nab9l76r1dwFBTVGKh_DdX1cmNv4EB_rmer5W02uD_7CJeC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+International+Conference+on+Dependable%2C+Autonomic+and+Secure+Computing&rft.atitle=Password+Recovery+for+RAR+Files+Using+CUDA&rft.au=Guang+Hu&rft.au=Jianhua+Ma&rft.au=Benxiong+Huang&rft.date=2009-12-01&rft.pub=IEEE&rft.isbn=9781424454204&rft.spage=486&rft.epage=490&rft_id=info:doi/10.1109%2FDASC.2009.123&rft.externalDocID=5380390
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769539294/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769539294/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769539294/sc.gif&client=summon&freeimage=true