Table of Content

Open Access iconOpen Access

ARTICLE

Cracking of WPA & WPA2 Using GPUs and Rule‐based Method

Tien‐Ho Chang1, Chia‐Mei Chen2, Han‐Wei Hsiao3, Gu‐Hsin Lai4

1 PhD student, Department of Information Management, National Sun Yat-sen University, Kaohsiung, Taiwan
2 Professor, National Sun Yat-sen University, Kaohsiung, Taiwan
3 Associate Professor, University of Kaohsiung, Kaohsiung, Taiwan
4 Assistant Professor, Taiwan Police College, Taipei, Taiwan

* Corresponding Author: Tien‐Ho Chang, email

Intelligent Automation & Soft Computing 2019, 25(1), 183-192. https://doi.org/10.31209/2018.100000054

Abstract

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols developed by the Wi-Fi Alliance to secure wireless computer networks. The prevailing usage of GPUs improves the brute force attacks and cryptanalysis on access points of the wireless networks. It is time-consuming for the cryptanalysis with the huge total combinations of 9563 max. Now, it is the turning point that the leap progress of GPUs makes the Wi-Fi cryptanalysis much more efficient than before. In this research, we proposed a rule-based password cracking scheme without dictionary files which improves the efficiency of cracking WPA/WPA2 protected access points. The experiment was performed on the real environment and the results demonstrate that the proposed scheme. The proposed scheme improves the efficiency from 2088000 PMKs/min to 16200000 PMKs/min.

Keywords


Cite This Article

APA Style
Chang, T., Chen, C., Hsiao, H., Lai, G. (2019). Cracking of WPA & WPA2 using gpus and rule‐based method. Intelligent Automation & Soft Computing, 25(1), 183-192. https://doi.org/10.31209/2018.100000054
Vancouver Style
Chang T, Chen C, Hsiao H, Lai G. Cracking of WPA & WPA2 using gpus and rule‐based method. Intell Automat Soft Comput . 2019;25(1):183-192 https://doi.org/10.31209/2018.100000054
IEEE Style
T. Chang, C. Chen, H. Hsiao, and G. Lai, “Cracking of WPA & WPA2 Using GPUs and Rule‐based Method,” Intell. Automat. Soft Comput. , vol. 25, no. 1, pp. 183-192, 2019. https://doi.org/10.31209/2018.100000054



cc Copyright © 2019 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1945

    View

  • 3397

    Download

  • 0

    Like

Related articles

Share Link