PRINCE - hashcat

PRINCE

modern password guessing algorithm

Why do we need a new attack-mode?

FUTURE OF PASSWORD HASHES

08.12.2014

Jens Steube - PRINCE algorithm

2

Future of modern password hashes

Feature ? High iteration count ? Salted ? Memory-intensive ? Configurable parameters ? Anti-Parallelization ?...

Effect ? Slow ? Rainbow-Tables resistance ? GPU resistance ? Slow ? Slow

08.12.2014

Jens Steube - PRINCE algorithm

3

Algorithms used for password hashing, by performance*

Name

Speed

NTLM, MD5, SHA1-512, Raw-Hashes

1 BH/s - 10 BH/s

Custom (Salt): VBull, IPB, MyBB

100 MH/s - 1 BH/s

DEScrypt

10 MH/s - 100 Mh/s

MD5crypt

1 MH - 10 MH/s

TrueCrypt, WPA/WPA2 (PBKDF2)

100kH/s - 1 MH/s

SHA512crypt, Bcrypt (Linux/Unix)

10kH/s - 100 kH/s

Custom (Iteration): Office, PDF, OSX

1kH/s - 10 kH/s

Scrypt (RAM intensive): Android 4.4+ FDE < 1 kH/s

* Performance oclHashcat v1.32 Single GPU Default settings for configurable algorithms

08.12.2014

Jens Steube - PRINCE algorithm

4

Effects of modern password hashes

? Obsolete attack-modes:

? Brute-Force-attack ? Rainbow-Tables

08.12.2014

Jens Steube - PRINCE algorithm

5

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download