A Fast, GPU based, Dictionary Attack to OpenPGP Secret Keyrings
IAC-CNR, Rome, Italy
Journal of Systems and Software (June 2011)
@article{Milo2011,
title={"AFast},
journal={"JournalofSystemsandSoftware"},
volume={"InPress},
number={""},
pages={"-"},
year={2011},
note={""},
issn={"0164-1212"},
doi={"DOI:10.1016/j.jss.2011.05.027"},
url={"http://caocao.myipcn.org/science/article/pii/S0164121211001270"},
author={"FabrizioMiloandMassimoBernaschiandMauroBisson"},
keywords={"cryptanalysis}
}
We describe the implementation, based on the Compute Unified Device Architecture (CUDA) for Graphics Processing Units (GPU), of a novel and very effective approach to quickly test passphrases used to protect private keyrings of OpenPGP cryptosystems. Our combination of algorithm and implementation, reduces the time required to test a set of possible passphrases by threeorders of magnitude with respect to an attack based on the procedure described in the OpenPGP standard and implemented by software packages like GnuPG, and a ten-fold speed up if compared to our highly tuned CPU implementation. Our solution can be considered a replacement and an extension of pgpcrack, a utility used in the past for attacking PGP. The optimizations described can be applied to other cryptosystems and confirm that the GPU architecture is also very effective for running applications that make extensive (if not exclusive) use of integer operations.
July 6, 2011 by hgpu