Work place: Amirkabir University of Technology (Tehran Polytechnic)/Department of Computer Engineering, Tehran, Iran
E-mail: mreza.taba@aut.ac.ir
Website:
Research Interests: Computer Architecture and Organization, Computer Networks, Network Architecture, Network Security, Distributed Computing, Cellular Automata
Biography
Mohammad Reza Esmaeili Taba was born in Qom, Iran in 1990. He received his Master of Science in computer engineering with area of study of computer networks from Amirkabir University of Technology (Tehran Polytechnic, Tehran, Iran) in 2015.
He currently works as Research Assistant at Innovative Computer Architectures Lab in Amirkabir University of Technology, supervised by Dr. Hossein Pedram. His current research interests include cognitive radio networks, distributed computing, cellular and wireless networks, and network security.
By Mohammad Reza. Hasani Ahangar Mohammad Reza. Esmaeili Taba Arash.Ghafouri
DOI: https://doi.org/10.5815/ijcnis.2017.06.03, Pub. Date: 8 Jun. 2017
Brute-force attacks are known to be the promising way to break into even most complicated systems by trying every possible permutation of the keys. But since cryptosystems began to use longer and more complex keys, brute-force attacks has lost their usability, because of relatively high complexity of trying every possible permutation with respect to computational power and computation time that was available to crypto breakers. Although computational power is increasing continuously, its increasing rate is less than that of key length and complexity. Having these assumptions in mind, it is infeasible for centralized traditional computing architectures with limited computation power to break into modern cryptosystem by compromising the key with implementing schemes like conventional brute-force. In this paper authors aim for devising a novel brute-force scheme which integrates a modern computing architecture (grid computing) with botnets in order to perform brute-force attacks with lower computation time and lower equipment cost for individual cryptobreakers who have no access to supercomputers. In summary, GCDBF uses a portion of computation power of each of the infected nodes belonging to a botnet in a grid-based environment in order to process a portion of total workload of a brute-force attack which is needed for breaking a specific key. This approach neutralizes the need of acquiring supercomputers for individual hackers while reducing the required time for breaking the key because of using grid computing architecture. For the purpose of evaluation, GCDBF is implemented in different scenarios to prove its performance in comparison to centralized brute-force scheme.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals