password cracking

Assessing the password cracking capabilities of high-end GPUs

At a glance:

  • The increasing power of GPUs and AI accelerators raises questions about their potential use in password cracking.
  • A comparison of the Nvidia H200, AMD MI300X, and Nvidia RTX 5090 GPUs shows that the RTX 5090 outperforms the AI accelerators in raw hash generation speed.
  • The price to performance comparison is striking, with the RTX 5090 being significantly cheaper than the AI accelerators.

Introduction

The rapid growth of compute power, driven by the AI surge, has led to the development of increasingly powerful hardware. This raises an interesting question for cybersecurity professionals: can this hardware be repurposed for password cracking, and if so, does that mean passwords are about to become obsolete?

Background

To explore this scenario, the Specops research team compared two flagship AI accelerators, the Nvidia H200 and AMD MI300X, with Nvidia’s top consumer GPU, the RTX 5090. The goal was to see whether a $30,000 AI GPU actually has an advantage when cracking passwords.

Setting up the test

The team used Hashcat, one of the most widely used password recovery tools, to benchmark the performance of the three GPUs. They tested five commonly encountered hashing algorithms: MD5, NTLM, bcrypt, SHA-256, and SHA-512.

The GPU password cracking results

The results showed that the RTX 5090 outperforms both AI accelerators in raw hash generation speed. Across multiple functions, the RTX 5090 hashes passwords at almost twice the speed of the H200.

Price to performance comparison

The price to performance comparison is striking. A single H200 is at least ten times the price of an RTX 5090, so you might reasonably expect far greater performance from the AI accelerator in a one-to-one comparison. That simply isn’t the case.

The real risk to organizations

Password cracking doesn’t require exotic or specialized hardware. Professional crackers and attackers already have access to all the computing power they need to brute-force weak passwords. Enforcing stronger passwords is essential, and the most effective defense is length.

The importance of detecting compromised passwords

The bigger risk is passwords that have already been exposed in data breaches. This often happens through password reuse. Tools like Specops Password Policy can help detect compromised passwords within an organization, allowing security teams to reset accounts and block attackers before those passwords are used to gain access.

How Specops helps

Specops Password Policy helps in two crucial ways: granular password policy management and continuous scanning for breached passwords. The Breached Password Protection feature continuously scans the Active Directory against a database of more than 5 billion unique compromised passwords.

Conclusion

Ultimately, organizations shouldn’t rely on passwords as the only line of defense. Multi-factor authentication (MFA) provides an additional barrier that protects accounts even if a password is eventually recovered. Specops Secure Access delivers that additional layer of security to Windows Logon, RDP, and VPN connections.

Editorial SiliconFeed is an automated feed: facts are checked against sources; copy is normalized and lightly edited for readers.

FAQ

What is the main difference between AI accelerators and consumer GPUs in terms of password cracking capabilities?
The main difference is that consumer GPUs, such as the Nvidia RTX 5090, outperform AI accelerators in raw hash generation speed, making them more effective at password cracking. Additionally, consumer GPUs are significantly cheaper than AI accelerators, making them a more cost-effective option for password cracking.
How can organizations protect themselves against password cracking attacks?
Organizations can protect themselves by enforcing stronger passwords, using multi-factor authentication (MFA), and detecting compromised passwords within their organization. Tools like Specops Password Policy can help with granular password policy management and continuous scanning for breached passwords.
What is the most effective defense against password cracking attacks?
The most effective defense is length. A 15-character password using a mix of character types, hashed with SHA-256, would take around 167 billion years to crack, even with powerful GPU hardware. At that point, brute-forcing simply isn’t a realistic attack. Additionally, using passphrases and implementing fine-grained password policies can also help to strengthen password security.

More in the feed

Prepared by the editorial stack from public data and external sources.

Original article