A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering [Extended Version]
[article]
2016
arXiv
pre-print
Professional attackers may thus turn to commercial high-end FPGA-based cluster solutions to significantly increase the speed of those attacks. ...
Our results indicate that our system could be used to break into each of more than 160,000 existing Wi-Fi networks requiring 3 days per network on our low-cost FPGA cluster in the worst case. ...
boards and the cluster. ...
arXiv:1605.07819v1
fatcat:3pyziwildbhfxc66pevbgop4wm
Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering
[chapter]
2016
Lecture Notes in Computer Science
Professional attackers may thus turn to commercial high-end FPGAbased cluster solutions to significantly increase the speed of those attacks. ...
In this paper, we present a highly optimized low-cost FPGA cluster-based WPA-2 Personal password recovery system that can not only achieve similar performance at a cost affordable by amateurs, but in comparison ...
boards and the cluster. ...
doi:10.1007/978-3-662-53140-2_27
fatcat:hol6evwuorbtzcjed6iue2rsni
Reconfigurable and High-efficiency Password Recovery Algorithms Based on HRCA
2021
IEEE Access
The traditional password recovery system is based mainly on the CPU and GPU and has a low energy efficiency ratio and cracking efficiency and cannot meet high-performance computing requirements. ...
to make full use of the chip resources to improve computational efficiency. ...
[40] presented a highly optimized low-cost FPGA cluster-based WPA2 personal password recovery system. Ding et al. ...
doi:10.1109/access.2021.3053068
fatcat:4352zqo6bfaotfpcmaoyvnooki
An application layer non-repudiation wireless system: A cross-layer approach
2010
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
The strengths associated to the brute-force attack lie in the simplicity of the attack algorithm and wide applicability. ...
Attacks on the Digital Signature Algorithm: Though there are numerous attacks applicable to ECDSA, including birthday and brute-force attacks. ...
doi:10.1109/wowmom.2010.5534971
dblp:conf/wowmom/Adibi10
fatcat:tzhws7t5tzao7eh7qcxfn5srfy
Survey on Multi-Access Edge Computing Security and Privacy
2021
IEEE Communications Surveys and Tutorials
The use of FPGA-based IoT devices is low compared to available technologies although TERO-PUF deployments for varied IoT processes were validated in this study. Zhang et al. ...
Latticebased, multivariate, hash-based, and elliptic curve schemes are employed for formulating QR algorithms in order to overcome exhaustive key searching or brute-force attacks commandeered by quantum ...
doi:10.1109/comst.2021.3062546
fatcat:u3xxvixiw5a4fdl2wxdla24ocu
Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020
2020
Positioning with 5G has many benefits such as high coverage, high accuracy, low latency, low energy requirements and scalability. ...
By catching parts of the WPA2 handshake they are able to once again perform dictionary and brute force attacks against the passwords of WPA3 networks. [4] 3.2.2. Security Group Downgrade Attack. ...
Our analysis shows that Transport Layer Security (TLS) can influence speed test results of weak clients with low computational power. ...
doi:10.2313/net-2020-11-1
fatcat:7og3fpqf5zfpfldmtsp57bbcg4
SENSORCOMM 2015 Committee SENSORCOMM Advisory Chairs Social sensing Abdulrahman Alarifi, King Abdulaziz City for Science and Technology (KACST), Kingdom of Saudi Arabia Atmospheric Icing and Sensing
unpublished
The creation of such a high quality conference program would not have been possible without their involvement. ...
As the speed of light (radio) is five orders of magnitude higher than the speed of sound, there are fundamental implications of time synchronization and propagation delays for localization. ...
a low cost FPGA target to implement the TDC. ...
fatcat:a577bnfn75d7dd6fpvita3illm