Abstract
The encryption of WPA & WPA2 is the present and security protection for the wireless LAN. With the vigorous development of parallel computing (GPU), the speed of cryptanalysis is rising up and getting more popular which causes the great threat to the Wi-Fi security. It is time-consuming for the wireless passwords analysis for the huge total combinations of 9563 max. Now, it is the turning point that the leap progress of GPU makes the Wi-Fi cryptanalysis much more efficient than before. In this research, we proposed a much faster speed (270,000 PMKs/s) compared to those in years, and the speed of computing PMKs/s is the major crucial factor and base for the mainstream of wireless passwords attacks, such as brute force, dictionary, time-memory trade-off (rainbow attack), and the generations of dictionary files.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, N.Y., Shim, J., Cho, S.J., Park, M., Han, S.: Android application protection against static reverse engineering based on multidexing. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 54–64 (2016)
Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. (JoWUA) 6(2), 78–97 (2015)
General Stats Homepage. https://wigle.net/gps/gps/main/stats/. Last accessed 30 April 2016
Fatani, H.A., Zamzami, I.F., Aliyu, M.: Awareness toward wireless security policy: case study of International Islamic University Malaysia. In: Proceedings of the 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), pp. 1–5. IEEE, Morocco (2013)
Krekan, J., Pleva, M., Dobos, L.: Statistical models based password candidates generation for specified language used in wireless LAN security audit. In: Proceedings of the 20th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 95–98. IEEE, Romania (2013)
Ahmed, S., Belali, M.H., Mahmud, I., Rahman, S., Sakib, N.: WPA 2 (Wi-Fi Protected Access 2) security enhancement: analysis and improvement. Global J. Comput. Sci. Tech. 12(6), 83–89 (2012)
Chen, C., Anada, H., Kawamoto, J., Sakurai, K.: A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints. J. Internet Serv. Inf. Secur. (JISIS) 6(2), 23–36 (2016)
Agarwal, M., Biswas, S., Nandi, S.: Detection of de-authentication denial of service attack in 802.11 networks. In: Proceedings of the Annual IEEE India Conference (INDICON), pp. 1–6. IEEE, India (2013)
Petiz, I., Rocha, E., Salvador, P., Nogueira, A.: Using multiscale traffic analysis to detect WPS attacks. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC), pp. 1020–1025. IEEE, Budapest (2013)
Zhang, L., Yu, J., Deng, Z., Zhang, R.: The security analysis of WPA encryption in wireless network. In: Proceedings of the 2nd International Conference Consumer Electronics on Communications and Networks (CECNet), pp. 1563–1567. IEEE, China (2012)
Tran, K.: GPU - accelerated WPA PSK cracking solutions. Minnesota State University (2010)
Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617–630. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_36
Bollapalli, K., Wu, Y., Gulati, K., Khatri, S., Calderbank, A.R.: Highly parallel decoding of space-time codes on graphics processing units. In: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1262–1269. IEEE, USA (2009)
MIMD Homepage, http://en.wikipedia.org/wiki/MIMD. Last accessed 30 April 2016
Nishikawa, N., Iwai, K., Tanaka, H., Kurokawa, T.: Throughput and power efficiency evaluations of block ciphers on kepler and GCN GPUs. In: Proceedings of the First International Symposium on Computing and Networking, pp. 366–372. IEEE, Japan (2013)
FLOPS Homepage, http://en.wikipedia.org/wiki/FLOPS. Last accessed 30 April 2016
CUDA Preprogramming Guide Homepage. http://docs.nvidia.com/cuda/cuda-c-programming-guide/#axzz3F5ky7blr. Last accessed 30 April 2016
Zhang, L., Yu, J., Zong, R., Chang, J., Xue, J.: Prevention research of cracking WPA-PSK key based on GPU. In: Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1965–1969. IEEE, China (2012)
Renugadevi, N., Mala, C.: Improved group key agreement for emergency cognitive radio mobile ad hoc networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. (JoWUA) 6(3), 73–86 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chang, T., Chen, C., Hsiao, H., Lai, G. (2018). The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-7850-7_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7849-1
Online ISBN: 978-981-10-7850-7
eBook Packages: Computer ScienceComputer Science (R0)