4. Conclusion
The advent of relatively low-cost graphics processors, mounted on cards that can be used in parallel, offers computing power that opens up new possibilities for studying and breaking cryptographic or hash algorithms. As the user is only human, he remains weak and predictable, and this can be used to increase the probability of finding passwords. Used wisely, there are free, well-maintained, high-performance and reliable tools available to use these materials to study the quality of passwords, on which the security of our data and access still too often rests.
With the use of such hardware and software in a distributed way, there is no doubt that the power will be further multiplied, also increasing the risk of having these passwords decoded by ill-intentioned people. More effective approaches, such as encouraging users to adopt best practices such as password management...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - MUJTABA (H.) - NVIDIA Pascal GP100 GPU Benchmarks Unveiled – Tesla P100 Is The Fastest Graphics Card Ever Created For Hyperscale Computing. - Wccftech (2016). http://wccftech.com/nvidia-gp100-gpu-tesla-p100-benchmarks/
Also...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!