Auckland Security Consultant uses PS3 for Cryptography

As the title states, a Senior Security Consultant by the name of Nick Breese is using a PS3 to crack MD5 hashes. Aside from this article incorrectly stating that the security expert is stealing passwords, as of now he has only shown how fast the machines can process MD5 hashes. This is just a small glimpse of what the software and hardware can do, the article compares how many cycles can be completed using Vector Computing:

As the title states, a Senior Security Consultant by the name of Nick Breese is using a PS3 to crack MD5 hashes. Aside from this article incorrectly stating that the security expert is stealing passwords, as of now he has only shown how fast the machines can process MD5 hashes. This is just a small glimpse of what the software and hardware can do, the article compares how many cycles can be completed using Vector Computing:

By implementing common ciphers and hash functions using vector computing, Breese has pushed the current upper limit of 10–15 million cycles per second — in Intel-based architecture — up to 1.4 billion cycles per second.

The project that Nick Breese is working on is called Crackstation, which he has been developing for a better part of 6 months. A lot of writers are saying that this is a “Hacking” tool and saying that its down right malicious. But they fail to realize that the PS3 hardware, combined with the software that is being developed by Nick Breese will in fact allow for some of the most commonly used encryption methods to be tested and seen for what they’re. Strong or weak.

But the biggest thing that erks me, is the phrases these technology writers use at the various new sites. They seem to love to use the word “hacker” even though it is the most mis-understood word you could use in the security and technology industry. But the amount of attention the word gets from the mass audiences is astounding, anything on the front page of any article that states “HACKER” will have people reading. But why? Is it because our entire day to day life revolves around technology?

Good job Nick Breese, if we didn’t have people like you, then we would still be using cryptography from the 70’s.

Read the PCWorld article.
Read the Gizmodo article.
Article about Crackstation Software for the PS3


Did you like this article?


0 Shares:
You May Also Like

Super “strace” perl script to assist with debugging programs that spawn child processes.

If you have ever ran into a problem with trying to strace apache or other processes that spawn children, then this script will help you out greatly. This small perl script will grab all of the PID's of the current process and its children and then run an strace command on all of them to provide strace output from all of apache. You can modify the strace line to your liking as well as the log names, by default it logs to a file based on date and time to the /tmp directory. Code included, click 'Read More'.

Windows Live Photo Gallery 2008 12.0.1193.815 Beta

Microsoft is pumping out more free software for the masses. I've never heard or seen Windows Live Photo Gallery, but I thought about downloading and installing this application to give it a whirl. During the install, I asked to install a bunch more Windows Live applications. Specifically the Mail component, since my MSN account is attached to my Hotmail. After installing everything, I ran the Windows Live Photo Gallery, and it was pretty amazing.

Splunk 3.1: A search engine that indexes all your servers logs, scripts, code and message traps

I had the chance to try Splunk out about 3 months ago. The software was rather easy to install, however one thing that did seem to a little hard to use was the interface and the general working with inputs for the software. The search function was really neat, and easy to find errors that were occurring. The free version is limited but still usable, in a larger environment this product would probably be a life saver. Single server deployments, not so much.