NSA@home - Home brew SHA-1 encryption cracker

User avatar
Pigeon
Posts: 18058
Joined: Thu Mar 31, 2011 3:00 pm

NSA@home - Home brew SHA-1 encryption cracker

Post by Pigeon » Sun Apr 03, 2011 3:12 am

Check the nsa@home website also.

A project called NSA@home has been making the rounds. It’s a gem. Stanislaw Skowronek got some old HDTV hardware off of eBay, and managed to create himself a pre-image brute force attack machine against SHA-1. The claim is that it can find a pre-image for an 8 character password hash from a 64 character set in about 24 hours.
The key here is that this hardware board uses 15 field programmable gate arrays (FPGAs), which are generic integrated circuits that can perform any logic function within their size limit. So, Stanislaw reverse engineered the connections between the FPGAs, wrote his own designs and now has a very powerful processing unit. FPGAs are better at specific tasks compared to general purpose CPUs, especially for functions that can be divided into many independently-running smaller chunks operating in parallel. Some cryptographic functions are a perfect match

More...


User avatar
TraumaT
Posts: 3547
Joined: Mon Apr 04, 2011 6:53 am

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by TraumaT » Tue Apr 05, 2011 11:48 am

Didn't understand a word of that, hahahahaha!

Sigh.
:(

User avatar
lkwalker
Posts: 6429
Joined: Mon Apr 04, 2011 8:20 pm
Location: Boycotteverything
Contact:

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by lkwalker » Tue Apr 05, 2011 11:50 am

TraumaT wrote:Didn't understand a word of that, hahahahaha!

Sigh.
:(
not surprising.
"If you don't think to good, don't think too much." Yogi

User avatar
Pigeon
Posts: 18058
Joined: Thu Mar 31, 2011 3:00 pm

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by Pigeon » Tue Apr 05, 2011 12:01 pm

Basically he created a computing machine out of junked parts for the purpose a cracking encryption keys and therefore encrypted messages in a shorter time. It does one thing but does it very well.

Pam
Princess Feet
Posts: 2883
Joined: Sun Apr 03, 2011 9:09 pm

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by Pam » Tue Apr 05, 2011 12:12 pm

TraumaT wrote:Didn't understand a word of that, hahahahaha!

Sigh.
:(
I didn't either :?

User avatar
Egg
Posts: 8628
Joined: Thu Mar 31, 2011 5:31 pm
Location: In Your Bedroom. Hi! :D

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by Egg » Tue Apr 05, 2011 9:08 pm

By trying random sequences it cracks passwords, like the one you use here or on your email, within 24 hours.... provided they're 8 characters or less. Time to up my passwords to 9 or more letters. ;)


MrPenny
Posts: 722
Joined: Mon Apr 04, 2011 1:10 pm

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by MrPenny » Tue Apr 05, 2011 11:24 pm

Here, this should make it clearer...

Image
One iteration within the SHA-1 compression function:
A, B, C, D and E are 32-bit words of the state;
F is a nonlinear function that varies;
n denotes a left bit rotation by n places;
n varies for each operation;
Wt is the expanded message word of round t;
Kt is the round constant of round t;
denotes addition modulo 232

User avatar
Ozfactor
Posts: 280
Joined: Tue Apr 05, 2011 4:08 pm
Location: Way out there.

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by Ozfactor » Tue Apr 05, 2011 11:28 pm

MrPenny wrote:Here, this should make it clearer...

Image
One iteration within the SHA-1 compression function:
A, B, C, D and E are 32-bit words of the state;
F is a nonlinear function that varies;
n denotes a left bit rotation by n places;
n varies for each operation;
Wt is the expanded message word of round t;
Kt is the round constant of round t;
denotes addition modulo 232
I understood until you posted this.
A foolish consistency is the hobgoblin of little minds, adored by little statesman and philosophers and divines. With consistency a great soul has simply nothing to do.
Emerson

User avatar
Pigeon
Posts: 18058
Joined: Thu Mar 31, 2011 3:00 pm

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by Pigeon » Wed Apr 06, 2011 4:07 am

Basically the letters in a message are mathematically shuffled around using the password which takes time.

In order to try many different passwords, it takes a lot a math operations, more then normally be done in a reasonable length of time. This is shortening the time to a day.

MrPenny
Posts: 722
Joined: Mon Apr 04, 2011 1:10 pm

Re: NSA@home - Home brew SHA-1 encryption cracker

Post by MrPenny » Wed Apr 06, 2011 4:30 am

Ozfactor wrote:I understood until you posted this.
I have no idea what it says either......I'm a system admin, not a codemonkey.

Post Reply