Abstract
With the development of Internet, there have been many malicious attacks against information system vulnerabilities. Password brute cracking is a kind of classic scene on the condition of powerful processing capability nowadays. In the face of huge key space, a distributed operation mode is required for brute force password attack. We designed a mobile phone-based distributed password analysis system, that is, server serves as DES key fragmentation and encryption, as well as MD5 hashing; mobile terminals perform DES violence analysis and MD5 dictionary attack. At the end, the conclusion and prospect for this architecture are proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Curtin, M.: A brute force search of DES keyspace. USENIX (1998). http://www.usenix.org/publications/login/1998L5/curtin.html
Wattenhofer, R.: Principles of Distributed Computing (2014)
Shamir, A.: On the security of DES. In: Williams, Hugh C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 280–281. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_22
Zhang, L., Zhang, Y.: Brute force attack on block cipher algorithm based on distributed computation. Comput. Eng. 34, 121–123 (2008)
Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6), 74–84 (2006)
Foster, I., Kesselman, C., Nick, J., et al.: Grid services for distributed system integration. Computer 1, 37–46 (2002)
Patil, P., Narayankar, P., Narayan, D.G., et al.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput. Sci. 78, 617–624 (2016)
Wang, X.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology Eprint Archive Report 2004 (2004)
Marculescu, A.: Mobile architecture for distributed brute-force attacks. J. Mob. Embed. Distrib. Syst. 6(1), 30–37 (2014)
Mamat, K., Azmat, F.: Mobile learning application for basic router and switch configuration on Android platform. Procedia Soc. Behav. Sci. 90, 235–244 (2013)
Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. http://www.w3.org/TR/wsdl20/
Karame, G.O., Capkun, S., Maurer, U.: Privacy-preserving outsourcing of brute-force key searches. In: ACM Workshop on Cloud Computing Security Workshop, pp. 101–112. ACM (2011)
Bhattacharyya, R., Mandal, A., Nandi, M.: Security analysis of the mode of JH hash function. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 168–191. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13858-4_10
Aoki, K., Sasaki, Yu.: Preimage attacks on one-block MD4, 63-Step MD5 and more. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103–119. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04159-4_7
Chang, D., Nandi, M.: Improved indifferentiability security analysis of chopMD hash function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 429–443. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-71039-4_27
Dandass, Y.S.: Using FPGAs to parallelize dictionary attacks for password cracking. In: Proceedings of the Hawaii International Conference on System Sciences, pp. 485–485. IEEE (2008)
Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors (2018). https://doi.org/10.3390/s18124486
Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9
Wang, Z.H., et al.: Automatically traceback RDP-based targeted Ransomware attacks. Wirel. Commun. Mob. Comput. (2018). https://doi.org/10.1155/2018/7943586
Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2019). https://doi.org/10.1016/j.future.2018.12.054
Qiu, J., Chai, Y., Liu, Y., Gu, Z.Q., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854–74864 (2018). https://doi.org/10.1109/ACCESS.2018.2881422
Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. Mobile Networks and Applications. ACM/Springer
Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mob. Comput. https://doi.org/10.1155/2018/5823439
Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https://doi.org/10.3390/s18082440
Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355–35364 (2018). https://doi.org/10.1109/ACCESS.2018.2846590
Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. (2018). https://doi.org/10.1109/jiot.2018.2846624
Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 2, 1–9 (2018)
Zhou, H., Sun, G., Fu, S., Jiang, W., Xie, T., Duan, D.: A distributed LRTCO algorithm in large-scale DVE multimedia systems. CMC: Comput. Mater. Continua 56(1), 73–89 (2018)
Wu, X., Zhang, C., Zhang, R., Wang, Y., Cui, J.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61–72 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, C., Wang, L., Li, M., Jiang, Y., Lu, H. (2019). A Distributed Cryptanalysis Framework Based on Mobile Phones. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)