Visible to the public Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA

TitleParallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
Publication TypeConference Paper
Year of Publication2019
AuthorsGillela, Maruthi, Prenosil, Vaclav, Ginjala, Venkat Reddy
Conference Name2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID)
Keywords32/34/26-instance parallelization, brute force attacks, Computer architecture, cryptography, field programmable gate arrays, Generators, GPU, guess password generation, Hardware, Hardware design languages, Hardware Implementation, HDL, human factors, IP core, LUT, MD5 hash algorithm, MD5 hash generation, password, pipeline processing, policy-based governance, pre-image brute-force attack, pubcrawl, single Virtex-7 FPGA device
AbstractFPGA implementation of MD5 hash algorithm is faster than its software counterpart, but a pre-image brute-force attack on MD5 hash still needs 2^(128) iterations theoretically. This work attempts to improve the speed of the brute-force attack on the MD5 algorithm using hardware implementation. A full 64-stage pipelining is done for MD5 hash generation and three architectures are presented for guess password generation. A 32/34/26-instance parallelization of MD5 hash generator and password generator pair is done to search for a password that was hashed using the MD5 algorithm. Total performance of about 6G trials/second has been achieved using a single Virtex-7 FPGA device.
DOI10.1109/VLSID.2019.00034
Citation Keygillela_parallelization_2019