Skip to main content

The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 797))

Included in the following conference series:

Abstract

The encryption of WPA & WPA2 is the present and security protection for the wireless LAN. With the vigorous development of parallel computing (GPU), the speed of cryptanalysis is rising up and getting more popular which causes the great threat to the Wi-Fi security. It is time-consuming for the wireless passwords analysis for the huge total combinations of 9563 max. Now, it is the turning point that the leap progress of GPU makes the Wi-Fi cryptanalysis much more efficient than before. In this research, we proposed a much faster speed (270,000 PMKs/s) compared to those in years, and the speed of computing PMKs/s is the major crucial factor and base for the mainstream of wireless passwords attacks, such as brute force, dictionary, time-memory trade-off (rainbow attack), and the generations of dictionary files.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, N.Y., Shim, J., Cho, S.J., Park, M., Han, S.: Android application protection against static reverse engineering based on multidexing. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 54–64 (2016)

    Google Scholar 

  2. Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. (JoWUA) 6(2), 78–97 (2015)

    Google Scholar 

  3. General Stats Homepage. https://wigle.net/gps/gps/main/stats/. Last accessed 30 April 2016

  4. Fatani, H.A., Zamzami, I.F., Aliyu, M.: Awareness toward wireless security policy: case study of International Islamic University Malaysia. In: Proceedings of the 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), pp. 1–5. IEEE, Morocco (2013)

    Google Scholar 

  5. Krekan, J., Pleva, M., Dobos, L.: Statistical models based password candidates generation for specified language used in wireless LAN security audit. In: Proceedings of the 20th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 95–98. IEEE, Romania (2013)

    Google Scholar 

  6. Ahmed, S., Belali, M.H., Mahmud, I., Rahman, S., Sakib, N.: WPA 2 (Wi-Fi Protected Access 2) security enhancement: analysis and improvement. Global J. Comput. Sci. Tech. 12(6), 83–89 (2012)

    Google Scholar 

  7. Chen, C., Anada, H., Kawamoto, J., Sakurai, K.: A hybrid encryption scheme with key-cloning protection: user/terminal double authentication via attributes and fingerprints. J. Internet Serv. Inf. Secur. (JISIS) 6(2), 23–36 (2016)

    Google Scholar 

  8. Agarwal, M., Biswas, S., Nandi, S.: Detection of de-authentication denial of service attack in 802.11 networks. In: Proceedings of the Annual IEEE India Conference (INDICON), pp. 1–6. IEEE, India (2013)

    Google Scholar 

  9. Petiz, I., Rocha, E., Salvador, P., Nogueira, A.: Using multiscale traffic analysis to detect WPS attacks. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC), pp. 1020–1025. IEEE, Budapest (2013)

    Google Scholar 

  10. Zhang, L., Yu, J., Deng, Z., Zhang, R.: The security analysis of WPA encryption in wireless network. In: Proceedings of the 2nd International Conference Consumer Electronics on Communications and Networks (CECNet), pp. 1563–1567. IEEE, China (2012)

    Google Scholar 

  11. Tran, K.: GPU - accelerated WPA PSK cracking solutions. Minnesota State University (2010)

    Google Scholar 

  12. Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617–630. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_36

    Chapter  Google Scholar 

  13. Bollapalli, K., Wu, Y., Gulati, K., Khatri, S., Calderbank, A.R.: Highly parallel decoding of space-time codes on graphics processing units. In: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1262–1269. IEEE, USA (2009)

    Google Scholar 

  14. MIMD Homepage, http://en.wikipedia.org/wiki/MIMD. Last accessed 30 April 2016

  15. Nishikawa, N., Iwai, K., Tanaka, H., Kurokawa, T.: Throughput and power efficiency evaluations of block ciphers on kepler and GCN GPUs. In: Proceedings of the First International Symposium on Computing and Networking, pp. 366–372. IEEE, Japan (2013)

    Google Scholar 

  16. FLOPS Homepage, http://en.wikipedia.org/wiki/FLOPS. Last accessed 30 April 2016

  17. CUDA Preprogramming Guide Homepage. http://docs.nvidia.com/cuda/cuda-c-programming-guide/#axzz3F5ky7blr. Last accessed 30 April 2016

  18. Zhang, L., Yu, J., Zong, R., Chang, J., Xue, J.: Prevention research of cracking WPA-PSK key based on GPU. In: Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1965–1969. IEEE, China (2012)

    Google Scholar 

  19. Renugadevi, N., Mala, C.: Improved group key agreement for emergency cognitive radio mobile ad hoc networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. (JoWUA) 6(3), 73–86 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to TienHo Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chang, T., Chen, C., Hsiao, H., Lai, G. (2018). The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7850-7_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7849-1

  • Online ISBN: 978-981-10-7850-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics