Categories

When FPGAs attack hashes

Posted on Wednesday, December 22nd, 2010 in encryption, FPGA, techniques by the machinegeek


What could you do with an array of 15 FPGAs? Why not attack hashes!
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. It is capable of searching the full 8-character keyspace (from a 64-character set) in about a day in the current configuration for 800 hashes concurrently, using about 240W of power. The minimum hardware used was an array of 15 Virtex-II Pro (XC2VP20) FPGAs in 3 identical sets of 5. Their website contains a complete description of this interesting and complex use of FPGAs.

This entry was posted on Wednesday, December 22nd, 2010 at 4:06 pm and is filed under encryption, FPGA, techniques. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: After reading all the comments, I have questions: Does this mean STM32 and AVR boards/parts from dodgy online sellers are suspect? What are your opinions?...
  • Sjaak: They are available with more flash then their ST counterparts which makes them more interesting. You don't have to port the code, but use another...
  • Sjaak: I dunno if you can 'license' register definitions, but I'm not a lawyer. Since the chip is available since 2015 and I haven't heard of...
  • Sjaak: They can be found on taobao or the Chinese markets in Shenzhen.
  • KH: I've been a really good boy, I only buy MCU parts from RS and Farnell. :-)