Password Cracking Using Sony Playstations

  • Hugo Kleinhans
  • Jonathan Butts
  • Sujeet Shenoi
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 306)


Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking – whether it employs brute force or sophisticated cryptanalytic techniques – requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.


Password cracking cell architecture Sony Playstation 3 


  1. 1.
    E. Altman, P. Capek, M. Gschwind, H. Hofstee, J. Kahle, R. Nair, S. Sathaye, J. Wellman, M. Suzuoki and T. Yamazaki, U.S. Patent 6779049 – Symmetric multi-processing system with attached processing units being able to access a shared memory without being structurally configured with an address translation mechanism, U.S. Patent and Trademark Office, Alexandria, Virginia, August 17, 2004.Google Scholar
  2. 2.
    N. Blachford, Cell architecture explained (Version 2) (www.blach, 2005.Google Scholar
  3. 3.
    N. Breese, Crackstation – Optimized cryptography on the PlayStation 3,, Auckland, New Zealand ( -v2.pdf), 2007.Google Scholar
  4. 4.
    M. Gschwind, The cell architecture, IBM Corporation, Armonk, New York ( rch.innovation.html), 2007.Google Scholar
  5. 5.
    IBM Corporation, Cell Broadband Engine Architecture (Version 1.02), Armonk, New York, 2007.Google Scholar
  6. 6.
    IBM Corporation, IBM Software Development Kit for Multicore Acceleration (Version 3), Armonk, New York, 2007.Google Scholar
  7. 7.
    E. Nakashima, In child porn case, a digital dilemma, The Washington Post, January 16, 2008.Google Scholar
  8. 8.
    R. Rivest, RFC 1321: The MD5 Message-Digest Algorithm, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts (, 1992.Google Scholar
  9. 9.
    A. Shimpi, Understanding the cell microprocessor, AnandTech, Minden, Nevada ( i=2379), 2005.Google Scholar
  10. 10.
    J. Stokes, SIMD architecture, Ars Technica ( les/paedia/cpu/simd.ars), 2000.Google Scholar
  11. 11.
    J. Stokes, Introducing the IBM/Sony/Toshiba cell processor Part I: The SIMD processing units, Ars Technica (arstechnica .com/articles/paedia/cpu/cell-1.ars), 2005.Google Scholar
  12. 12.
    M. Suzuoki, T. Yamazaki, C. Johns, S. Asano, A. Kunimatsu and Y. Watanabe, U.S. Patent 6809734 – Resource dedication system and method for a computer architecture for broadband networks, U.S. Patent and Trademark Office, Alexandria, Virginia, October 26, 2004.Google Scholar
  13. 13.
    C. Swenson, Modern Cryptanalysis: Techniques for Advanced Code Breaking, Wiley, Indianapolis, Indiana, 2008.Google Scholar
  14. 14.
    T. Tian and C. Shih, Software techniques for shared-cache multi-core systems, Intel Corporation, Santa Clara, California ( ache-multi-core-systems), 2007.Google Scholar
  15. 15.
    D. Wang, The cell microprocessor, Real World Technologies, Colton, California ( 005084318), 2005.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Hugo Kleinhans
  • Jonathan Butts
  • Sujeet Shenoi

There are no affiliations available

Personalised recommendations