Abstract
Password recovery of WPA/WPA2-PSK is an important problem in computer forensics. It is difficult to deal with this problem by traditional methods such as brute force, rainbow table, dictionary, and so on. We give a new method based on parallel random search to solve this problem. This method integrates the advantages that random search can improve the hit rate and the parallel search can improve the operating efficiency. The principle and implementation of this method is also given based on GPU. Finally the test results show that this method can improve the speed of the password search for WPA2-PSK.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, S64–S73 (2010)
IEEE Computer Society.: IEEE Standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part II: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. In: IEEE Std 802.11TM-2007 (2007)
Mavridis, I.P., Androulakis, I.E., Halkias, A.B., Mylonas, P.H.: Real-life paradigms of wireless network security attacks. In: Proceedings 2011 Panhellenic Conference on Informatics, PCI 2011, pp. 112–116, art. No. 6065074, ISBN: 978-076954389-5
Delaune, S., Jacquemard, F.: A theory of dictionary attacks and its complexity. In: Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 2–15. Cambridge, UK (2004)
Hu, G., Ma, J., Huang, B.: Password recovery for rar files using CUDA. Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 486–490. Chengdu, China (2009)
Apostal, D., Foerster, K., Chatterjee, A., Desell, T.: Password recovery using MPI and CUDA. In: The 19th International Conference on High Performance Computing, pp. 1–9 (2012)
Zhan, X.J., Hong, J.X.: Study on GPU-based password recovery for MS Office 2003 document. In: The 7th International Conference on Computer Science & Education, pp. 517–520 (2012)
Kim, K.: Distributed password cracking on GPU nodes. In: The 7th International Conference on Computing and Convergence Technology, pp. 647–650 (2012)
Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 364–372. ACM (2005)
Liu, Y.L., Jin, Z.G.: Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture, Int. J. Commun. Syst. (2013). doi:10.1002/dac
Visan, S.A.: WPA/WPA2 password security testing using Graphics Processing Units. J. Mobile, Embed. Distrib. Syst. V(4) (2013). ISSN 2067-4074
Bernaschi, M., Bisson, M., Gabrielli, E., Tacconi, S.: An architecture for distributed dictionary attacks to cryptosystems. J. Comput. 4, 378–386 (2009)
Martinovic, G., Horvat, L., Balen, J.: Stochastic approach on hash cracking. In: MIPRO, pp. 887–891 (2012)
NVIDIA Corporation CUDA. http://www.nvidia.com/object/cudahomenew.html
Acknowledgments
This study is supported by the Shandong Province Outstanding Young Scientists Research Award Fund Project (Grant No. BS2013DX010), by the Natural Science Foundation of Shandong Province, China (Grant No. ZR2011FQ030, ZR2013FQ001, ZR2013FM025), and by the Shandong Academy of Sciences Youth Fund Project (Grant No. 2013QN007).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Ge, L., Wang, L., Xu, L., Yang, S. (2016). Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU. In: Zeng, QA. (eds) Wireless Communications, Networking and Applications. Lecture Notes in Electrical Engineering, vol 348. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2580-5_105
Download citation
DOI: https://doi.org/10.1007/978-81-322-2580-5_105
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2579-9
Online ISBN: 978-81-322-2580-5
eBook Packages: EngineeringEngineering (R0)