Skip to main content

Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU

  • Conference paper
  • First Online:
Wireless Communications, Networking and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 348))

Abstract

Password recovery of WPA/WPA2-PSK is an important problem in computer forensics. It is difficult to deal with this problem by traditional methods such as brute force, rainbow table, dictionary, and so on. We give a new method based on parallel random search to solve this problem. This method integrates the advantages that random search can improve the hit rate and the parallel search can improve the operating efficiency. The principle and implementation of this method is also given based on GPU. Finally the test results show that this method can improve the speed of the password search for WPA2-PSK.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, S64–S73 (2010)

    Article  Google Scholar 

  2. IEEE Computer Society.: IEEE Standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part II: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. In: IEEE Std 802.11TM-2007 (2007)

    Google Scholar 

  3. Mavridis, I.P., Androulakis, I.E., Halkias, A.B., Mylonas, P.H.: Real-life paradigms of wireless network security attacks. In: Proceedings 2011 Panhellenic Conference on Informatics, PCI 2011, pp. 112–116, art. No. 6065074, ISBN: 978-076954389-5

    Google Scholar 

  4. Delaune, S., Jacquemard, F.: A theory of dictionary attacks and its complexity. In: Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 2–15. Cambridge, UK (2004)

    Google Scholar 

  5. Hu, G., Ma, J., Huang, B.: Password recovery for rar files using CUDA. Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 486–490. Chengdu, China (2009)

    Google Scholar 

  6. Apostal, D., Foerster, K., Chatterjee, A., Desell, T.: Password recovery using MPI and CUDA. In: The 19th International Conference on High Performance Computing, pp. 1–9 (2012)

    Google Scholar 

  7. Zhan, X.J., Hong, J.X.: Study on GPU-based password recovery for MS Office 2003 document. In: The 7th International Conference on Computer Science & Education, pp. 517–520 (2012)

    Google Scholar 

  8. Kim, K.: Distributed password cracking on GPU nodes. In: The 7th International Conference on Computing and Convergence Technology, pp. 647–650 (2012)

    Google Scholar 

  9. Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 364–372. ACM (2005)

    Google Scholar 

  10. Liu, Y.L., Jin, Z.G.: Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture, Int. J. Commun. Syst. (2013). doi:10.1002/dac

  11. Visan, S.A.: WPA/WPA2 password security testing using Graphics Processing Units. J. Mobile, Embed. Distrib. Syst. V(4) (2013). ISSN 2067-4074

    Google Scholar 

  12. Bernaschi, M., Bisson, M., Gabrielli, E., Tacconi, S.: An architecture for distributed dictionary attacks to cryptosystems. J. Comput. 4, 378–386 (2009)

    Article  Google Scholar 

  13. Martinovic, G., Horvat, L., Balen, J.: Stochastic approach on hash cracking. In: MIPRO, pp. 887–891 (2012)

    Google Scholar 

  14. MPICH. http://www.mcs.anl.gov/research/projects/mpich2/

  15. NVIDIA Corporation CUDA. http://www.nvidia.com/object/cudahomenew.html

Download references

Acknowledgments

This study is supported by the Shandong Province Outstanding Young Scientists Research Award Fund Project (Grant No. BS2013DX010), by the Natural Science Foundation of Shandong Province, China (Grant No. ZR2011FQ030, ZR2013FQ001, ZR2013FM025), and by the Shandong Academy of Sciences Youth Fund Project (Grant No. 2013QN007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Ge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Ge, L., Wang, L., Xu, L., Yang, S. (2016). Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU. In: Zeng, QA. (eds) Wireless Communications, Networking and Applications. Lecture Notes in Electrical Engineering, vol 348. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2580-5_105

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2580-5_105

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2579-9

  • Online ISBN: 978-81-322-2580-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics