Open source computer cluster for Password Cracking

Authors

DOI:

https://doi.org/10.15649/2346030X.4242

Keywords:

cluster, HPC, password cracking, cybersecurity, passwords

Abstract

This research focuses on the evaluation of efficiency in execution time for processes that demand significant computational capacity such as password cracking or password guessing from a hash, so the defined problem was, what is the level of efficiency of the open source computer cluster for password cracking processing for the purpose of validating password strength? For this purpose, a two-node computer cluster was used under a Linux operating system and OpenMPI, and the John the Ripper (JTR) tool was used for the password discovery process. The applied methodology includes four stages: selection of the hardware platform, selection of the software platform, cluster implementation and cluster testing, with two scenarios, testing with MD5 and SHA-1 hashes, and testing NT operating system hashes (Windows systems) and SHA-512 (Ubuntu 20.04 Linux operating system). The results of which indicate a decrease between 52% and 64% in the processing time to discover a password with the cluster at its maximum use of processors (16 in total) compared to the same procedure but with a single computer or node. Therefore, the level of efficiency found is positively significant.

References

[1] IBM, “¿Qué es la computación de alto rendimiento (HPC)?” Accessed: Jul. 13, 2024. [Online]. Available: https://www.ibm.com/es-es/topics/hpc.

[2] J. C. García-Ojeda, M. L. Ortíz, R. S. García, J. H. Cáceres, and A. Argoti, “A Computer Cluster for Big Data and Data Analytics Management: Design, Implementation, and Assessment,” in Proceedings of the Euro American Conference on Telematics and Information Systems, in EATIS ’18. New York, NY, USA: Association for Computing Machinery, 2018. doi: 10.1145/3293614.3293626.

[3] B. Kocot, P. Czarnul, and J. Proficz, “Energy-Aware Scheduling for High-Performance Computing Systems: A Survey,” Energies (Basel), vol. 16, no. 2, 2023, doi: 10.3390/en16020890.

[4] M. Lapegna, V. Mele, and D. Romano, “Clustering Algorithms for Enhanced Trustworthiness on High-Performance Edge-Computing Devices,” Electronics (Basel), vol. 12, no. 7, 2023, doi: 10.3390/electronics12071689.

[5] C. Paramita, F. A. Rafrastara, U. Sudibyo, and R. Wibowo, “Performance Evaluation of Linear Regression Algorithm in Cluster Environment,” Nov. 2020. doi: 10.13140/RG.2.2.20357.91360.

[6] C. Paramita, S. Catur, S. Luqman Afi, and R. Fauzi Adi, “The Use of Cluster Computing and Random Forest Algoritm for Flight Delay Prediction,” Mar. 2022, Zenodo. doi: 10.5281/zenodo.6377016.

[7] M. López-Martínez et al., “A High-Performance Computing Cluster for Distributed Deep Learning: A Practical Case of Weed Classification Using Convolutional Neural Network Models,” Applied Sciences, vol. 13, no. 10, 2023, doi: 10.3390/app13106007.

[8] E. Zhou, Y. Peng, G. Shao, F. Deng, Y. Miao, and W. Fan, “Password cracking using chunk similarity,” Future Generation Computer Systems, vol. 150, pp. 380–394, 2024, doi: https://doi.org/10.1016/j.future.2023.09.013.

[9] M.-D. Cano, A. Villafranca, and I. Tasic, “Performance evaluation of Cuckoo filters as an enhancement tool for password cracking,” Cybersecurity, vol. 6, no. 1, p. 57, 2023, doi: 10.1186/s42400-023-00193-6.

[10] I. Alkhwaja et al., “Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming,” Applied Sciences, vol. 13, no. 10, 2023, doi: 10.3390/app13105979.

[11] S. Jamshed, “Chapter 2 - Introduction to High-Performance Computing,” in Using HPC for Computational Fluid Dynamics, S. Jamshed, Ed., Oxford: Academic Press, 2015, pp. 21–40. doi: https://doi.org/10.1016/B978-0-12-801567-4.00002-7.

[12] J. O’Reilly, “Chapter 9 - High-Performance Computing,” in Network Storage, J. O’Reilly, Ed., Boston: Morgan Kaufmann, 2017, pp. 151–161. doi: https://doi.org/10.1016/B978-0-12-803863-5.00009-1.

[13] G. Lee, “Chapter 10 - High-Performance Computing Networks,” in Cloud Networking, G. Lee, Ed., Boston: Morgan Kaufmann, 2014, pp. 179–189. doi: https://doi.org/10.1016/B978-0-12-800728-0.00010-2.

[14] C. Severance, K. Dowd, and O. T. Library, High Performance Computing. in Online access: Center for Open Education Open Textbook Library. OpenStax CNX, 2010. [Online]. Available: https://books.google.com.pe/books?id=9MaQzQEACAAJ.

[15] R. Raj and B. Pavithra, “Cluster Computing,” Indian Scientific Journal Of Research In Engineering And Management, vol. 6, no. 6, Jun. 2022, doi: http://dx.doi.org/10.55041/ijsrem14249.

[16] D. Jiménez and A. Medina, “Cluster de Alto Rendimiento,” Journal Innovación y Tecnología, pp. 16–27, 2014, Accessed: Jul. 13, 2024. [Online]. Available: http://revistasbolivianas.umsa.bo/scielo.php?script=sci_arttext&pid=S1234-12342014000100004&lng=pt&nrm=iso.

[17] Kaspersky, “Cómo almacenar correctamente tus contraseñas de usuario | Blog oficial de Kaspersky.” Accessed: Jul. 18, 2024. [Online]. Available: https://www.kaspersky.es/blog/how-to-store-passwords/29183/.

[18] S. K. Jena, R. C. Barik, and R. Priyadarshini, “A systematic state-of-art review on digital identity challenges with solutions using conjugation of IOT and blockchain in healthcare,” Internet of Things, vol. 25, p. 101111, Apr. 2024, doi: 10.1016/J.IOT.2024.101111.

[19] C. Wright, “Information Gathering,” The IT Regulatory and Standards Compliance Handbook, pp. 73–114, Jan. 2008, doi: 10.1016/B978-1-59749-266-9.00005-9.

[20] Daniel W. Dieterle, Password Cracking with Kali Linux | Security | eBook, 1st Edition. 2024, 2024. Accessed: Jul. 18, 2024. [Online]. Available: https://www.packtpub.com/en-ar/product/password-cracking-with-kali-linux-9781835888544.

[21] BBC, “Millions using 123456 as password, security study finds.” Accessed: Jul. 18, 2024. [Online]. Available: https://www.bbc.com/news/technology-47974583.

[22] Kaspersky, “¿Qué es un ataque de diccionario?” Accessed: Jul. 18, 2024. [Online]. Available: https://latam.kaspersky.com/resource-center/definitions/what-is-a-dictionary-attack.

[23] V. Nair and D. Song, “Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance,” Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, pp. 56–72, Jun. 2023, doi: 10.1109/EuroSP57164.2023.00013.

[24] N. Tihanyi, T. Bisztray, B. Borsos, and S. Raveau, “Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 2981–2996, Jun. 2023, doi: 10.1109/TIFS.2024.3356162.

[25] Cybersecurity & Infraestructure Security Agency, “Avoiding Social Engineering and Phishing Attacks | CISA.” Accessed: Jul. 18, 2024. [Online]. Available: https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks.

[26] J. Bonneau and S. Preibusch, “The password thicket: technical and market failures in human authentication on the web,” 2010.

[27] P. G. Kelley et al., “Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms,” Proc IEEE Symp Secur Priv, pp. 523–537, 2012, doi: 10.1109/SP.2012.38.

[28] A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, “The Tangled Web of Password Reuse,” 2014, Accessed: Jul. 18, 2024. [Online]. Available: http://dx.doi.org/doi-info-to-be-provided-later.

[29] B. Ur et al., How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. 2012. Accessed: Jul. 18, 2024. [Online]. Available: https://www.cs.bham.ac.uk/~garciaf/publications/Gone_in_360_seconds_Hijacking_with_Hitag2_poster_2012.pdf.

[30] B. Ur et al., Measuring real-world accuracies and biases in modeling password guessability. 2015. Accessed: Jul. 18, 2024. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-ur.pdf.

Downloads

Published

2025-09-01

How to Cite

[1]
W. R. Marchand-Niño, G. Ciriaco-Soto, E. F. Ortiz-Morales, G. Olivera-Ruiz, and E. A. Ortiz-Morales, “Open source computer cluster for Password Cracking”, AiBi Revista de Investigación, Administración e Ingeniería, vol. 13, no. 3, pp. 1–10, Sep. 2025, doi: 10.15649/2346030X.4242.

Downloads

Download data is not yet available.

Issue

Section

Research Articles