Back to Search Start Over

An FPGA Architecture for the Recovery of WPA/WPA2 Keys.

Authors :
Johnson, Tyler
Roggow, Daniel
Jones, Phillip H.
Zambreno, Joseph
Source :
Journal of Circuits, Systems & Computers. Aug2015, Vol. 24 Issue 7, p-1. 26p.
Publication Year :
2015

Abstract

Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode, as it is the quickest and easiest to configure. This vulnerability requires the attacker to capture the traffic from the four-way handshake between the AP and client, and then have enough compute time to reverse the passphrase. Increasing the rate at which passphrases can be reversed reduces the amount of time required to construct a repository of service set identifiers (SSIDs) and passphrases, which can increase the chances an attack is successful, or, alternatively, reduce the difficulty of auditing a wireless network for security purposes. This work focuses on creating an field programmable gate array (FPGA)-based architecture to accelerate the generation of a WPA/WPA2 pairwise master key (PMK) lookup table (LUT) for the recovery of the passphrase, with special emphasis on the secure hash algorithm-1 (SHA-1) implementation. PMK generation relies heavily on SHA-1 hashing and, as this work shows, an optimized SHA-1 implementation can achieve up to a 40 × speedup over an unoptimized implementation when generating PMKs. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
02181266
Volume :
24
Issue :
7
Database :
Academic Search Index
Journal :
Journal of Circuits, Systems & Computers
Publication Type :
Academic Journal
Accession number :
108310426
Full Text :
https://doi.org/10.1142/S0218126615501054