Mohammad Reza. Esmaeili Taba

Work place: Amirkabir University of Technology (Tehran Polytechnic)/Department of Computer Engineering, Tehran, Iran

E-mail: mreza.taba@aut.ac.ir

Website:

Research Interests: Computer Architecture and Organization, Computer Networks, Network Architecture, Network Security, Distributed Computing, Cellular Automata

Biography

Mohammad Reza Esmaeili Taba was born in Qom, Iran in 1990. He received his Master of Science in computer engineering with area of study of computer networks from Amirkabir University of Technology (Tehran Polytechnic, Tehran, Iran) in 2015.

He currently works as Research Assistant at Innovative Computer Architectures Lab in Amirkabir University of Technology, supervised by Dr. Hossein Pedram. His current research interests include cognitive radio networks, distributed computing, cellular and wireless networks, and network security.

Author Articles
On a Novel Grid Computing-Based Distributed Brute-force Attack Scheme (GCDBF) By Exploiting Botnets

By Mohammad Reza. Hasani Ahangar Mohammad Reza. Esmaeili Taba Arash.Ghafouri

DOI: https://doi.org/10.5815/ijcnis.2017.06.03, Pub. Date: 8 Jun. 2017

Brute-force attacks are known to be the promising way to break into even most complicated systems by trying every possible permutation of the keys. But since cryptosystems began to use longer and more complex keys, brute-force attacks has lost their usability, because of relatively high complexity of trying every possible permutation with respect to computational power and computation time that was available to crypto breakers. Although computational power is increasing continuously, its increasing rate is less than that of key length and complexity. Having these assumptions in mind, it is infeasible for centralized traditional computing architectures with limited computation power to break into modern cryptosystem by compromising the key with implementing schemes like conventional brute-force. In this paper authors aim for devising a novel brute-force scheme which integrates a modern computing architecture (grid computing) with botnets in order to perform brute-force attacks with lower computation time and lower equipment cost for individual cryptobreakers who have no access to supercomputers. In summary, GCDBF uses a portion of computation power of each of the infected nodes belonging to a botnet in a grid-based environment in order to process a portion of total workload of a brute-force attack which is needed for breaking a specific key. This approach neutralizes the need of acquiring supercomputers for individual hackers while reducing the required time for breaking the key because of using grid computing architecture. For the purpose of evaluation, GCDBF is implemented in different scenarios to prove its performance in comparison to centralized brute-force scheme.

[...] Read more.
Other Articles