Filters








7 Hits in 5.1 sec

Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering [Extended Version] [article]

Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
2016 arXiv   pre-print
Professional attackers may thus turn to commercial high-end FPGA-based cluster solutions to significantly increase the speed of those attacks.  ...  Our results indicate that our system could be used to break into each of more than 160,000 existing Wi-Fi networks requiring 3 days per network on our low-cost FPGA cluster in the worst case.  ...  boards and the cluster.  ... 
arXiv:1605.07819v1 fatcat:3pyziwildbhfxc66pevbgop4wm

Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering [chapter]

Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
2016 Lecture Notes in Computer Science  
Professional attackers may thus turn to commercial high-end FPGAbased cluster solutions to significantly increase the speed of those attacks.  ...  In this paper, we present a highly optimized low-cost FPGA cluster-based WPA-2 Personal password recovery system that can not only achieve similar performance at a cost affordable by amateurs, but in comparison  ...  boards and the cluster.  ... 
doi:10.1007/978-3-662-53140-2_27 fatcat:hol6evwuorbtzcjed6iue2rsni

Reconfigurable and High-efficiency Password Recovery Algorithms Based on HRCA

Bin Li, Feng Feng, Xiaojie Chen, Yan Cao
2021 IEEE Access  
The traditional password recovery system is based mainly on the CPU and GPU and has a low energy efficiency ratio and cracking efficiency and cannot meet high-performance computing requirements.  ...  to make full use of the chip resources to improve computational efficiency.  ...  [40] presented a highly optimized low-cost FPGA cluster-based WPA2 personal password recovery system. Ding et al.  ... 
doi:10.1109/access.2021.3053068 fatcat:4352zqo6bfaotfpcmaoyvnooki

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi
2010 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
The strengths associated to the brute-force attack lie in the simplicity of the attack algorithm and wide applicability.  ...  Attacks on the Digital Signature Algorithm: Though there are numerous attacks applicable to ECDSA, including birthday and brute-force attacks.  ... 
doi:10.1109/wowmom.2010.5534971 dblp:conf/wowmom/Adibi10 fatcat:tzhws7t5tzao7eh7qcxfn5srfy

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
The use of FPGA-based IoT devices is low compared to available technologies although TERO-PUF deployments for varied IoT processes were validated in this study. Zhang et al.  ...  Latticebased, multivariate, hash-based, and elliptic curve schemes are employed for formulating QR algorithms in order to overcome exhaustive key searching or brute-force attacks commandeered by quantum  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2020
Positioning with 5G has many benefits such as high coverage, high accuracy, low latency, low energy requirements and scalability.  ...  By catching parts of the WPA2 handshake they are able to once again perform dictionary and brute force attacks against the passwords of WPA3 networks. [4] 3.2.2. Security Group Downgrade Attack.  ...  Our analysis shows that Transport Layer Security (TLS) can influence speed test results of weak clients with low computational power.  ... 
doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4

SENSORCOMM 2015 Committee SENSORCOMM Advisory Chairs Social sensing Abdulrahman Alarifi, King Abdulaziz City for Science and Technology (KACST), Kingdom of Saudi Arabia Atmospheric Icing and Sensing

Sergey Yurish, Spain, Jean Vasseur, Jens Hovem, Pascal Lorenz, Michael Niedermayer, A Siemens, Harkirat Germany, Singh, S Kumar, Joshua Ellul, Jean Vasseur (+114 others)
unpublished
The creation of such a high quality conference program would not have been possible without their involvement.  ...  As the speed of light (radio) is five orders of magnitude higher than the speed of sound, there are fundamental implications of time synchronization and propagation delays for localization.  ...  a low cost FPGA target to implement the TDC.  ... 
fatcat:a577bnfn75d7dd6fpvita3illm