› Foros › PlayStation 3 › Scene
El analista ha estado trabajando por seis meses en un proyecto llamado “Crackstation”, usando a la consola PS3 para sus investigación de descifrado en las barreras de seguridad. A la conclusión que llegó es que por diseño, la PS3 es muy fácil para criptografía; mientras que los procesadores Intel están diseñados para complicar el trabajo de forjar sus barras, la PS3 es muy simple y rápida de hackear.
Nick Breese hizo una demostración de la potencia de los Cell de la PlayStation en la conferencia de seguridad Kiwicon, que se celebró a mediados de Noviembre… la comparación se realizó con un procesador Intel, que es capaz de tener entre 10-15 millones de ciclos por segundo, en cambio los Cell llegaron a tener hasta 1.400 millones de ciclos por segundo, haciéndolo más eficaz para desvelar las contraseñas en menor cantidad de tiempo, sobre todo cuando se utiliza la “fuerza bruta”.
PCWorld escribió:La consola de Sony ha permitido a un investigador en seguridad aplicar la potencia de cálculo para descifrar contraseñas mucho más rápidamente que con las máquinas actuales.
Nick Breese, de la firma Security-Assesment.com ha logrado implementar algoritmos que aprovechan los recursos de la PS3 para convertirla no en una PlayStation, sino en una ‘CrackStation’ capaz de aumentar el límite de los micros Intel actuales, que llegan a los 10 o 15 millones de ciclos por segundo.
Con la PS3 y estas técnicas Breese ha llegado a los 1.400 millones de ciclos por segundo.
Esto permite a la consola de Sony procesar datos en un tiempo 100 veces inferior a las plataformas convencionales, y el software Linux sobre el que se basa el sistema de descifrado hace uso intensivo de las SPUs de la consola. En sus pruebas con cifrado MD5 consiguió esa altísima cifra de cálculos por segundo.
PCWorld Ingles escribió:Nick Breese, a senior security consultant at Auckland-based Security-assessment.com, has come up with a way to drastically increase the processing capability of cracking passwords, using a PS3.
By implementing common ciphers and hash functions using vector computing, Breese has pushed the current upper limit of 10--15 million cycles per second -- in Intel-based architecture -- up to 1.4 billion cycles per second.
Breese, who has been working on the project, called "Crackstation", for the past six months, used the Sony PlayStation 3 gaming console for his break-through research. PS3's Cell Broadband Engine technology was created by IBM, Toshiba and Sony. The companies collaborated to create the CBE, commonly known as Cell, processor, which consists of one scalar processor and eight vector processors.
By design, PS3 is very suitable for cryptography, says Breese. Intel processors are designed to do all kinds of complex calculations, whereas the PS3 is good at doing simple things very quickly. "And believe it or not, cryptography really is simple," he says. "Lots of simple operations being done one at the time."
The strength of cryptography implementations is usually based on its cracking time -- how long it would take for someone to sit down and crack it, says Breese. His discovery has demonstrated that the capability of cracking encryption algorithms has multiplied by 100.
Breese's discovery "will unfortunately make cryptography cracking faster", he says. However, he hopes that his research will help drive the need for stronger cryptography to be used, and push for better implementations of cryptography.
The big implication for the industry is the fact that using Intel processors as a benchmark just is not good enough anymore, he says.
Within PS3, in Breese's case running Linux, there are six SPU (Synergistic Processing Unit) processor cores. Each core is able to do four calculations -- so across all of the cores it is possible to do 24 calculations at the same time, he says. The simplistic design of the processor architecture also helped increase the speed, he says.
Breese was looking for a way to optimize processing to make MD5 calculations go very quickly, he says. MD5 (Message-Digest algorithm 5) is one of the most used cryptographic hash functions. The PS3 managed to conduct over 1.4 billion MD5 calculations a second, he says.
But the speed increase relates to the use of SIMD (Single Instruction, Multiple Data) computing, rather than solely the PS3, he says. "It's just that the Cell processor cluster within the Playstation 3 is very good at it," he says.
Vector, or SIMD, computing involves performing calculations against a data group, rather than against a single piece of data, which is known as scalar computing, says Breese. Using vector computing allowed him to run cryptography calculations in parallel, he says.
Breese presented his findings at the Kiwicon hacker conference, held in Wellington earlier this month.
"We seem to have a world's first here, with potentially huge implications around the validity of some encryption algorithms going forward," says Security-assessment.com chief executive Peter Benson. "While we have not currently worked on distributing load across PS3s, the theory is there to increase this level of performance further."
The team rewrote some of the code to run under the vector-based methodology, and as soon as they did that they started getting "some pretty spectacular results", says Benson. It took a while before the company decided to release the numbers "because we just didn't believe them," he says.
Breese also increased the speed in x86 processors by using the same method on the x86-equivalent technology known as SSE (Streaming SIMD Extensions), but the increase was not as significant. He found that the x86 SSE2 implementation could conduct over three times the number of MD5 calculations than the scalar equivalent.
Breese says the initial reason for embarking on the research project was to get the company to buy him a PS3.