The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
Share
Zusammenfassung
WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate the strength of WPA2 default passwords generated by the algorithms embedded in routers using a simulated brute-force attack. The findings ascertain the prevalence of insecurities in the default WPA2 passwords due to low charset size and weak encryption algorithm. For these reasons, we propose Blum-Blum-Shub Elliptic Curve Pseudorandom Number Generator (BBS-ECPRNG) algorithm as a replacement to the algorithms embedded in routers. To prove its validity, we generated distinct sequences of 10 6 bits each and analyzed sequence output using the NIST statistical test suite. The generated bit sequence of BBS-ECPRNG was converted to password characters and subjected to simulation test. Findings reveal that the BBS-ECPRNG password significantly decreased the password-cracking success by 25 times more as compared to the default WPA2 passwords generated by router-based algorithms in the Philippine market.
Recommended Citation
Omorog, C. D., Gerardo, B. D., & Medina, R. P. (2018, September). The performance of blum-blum-shub elliptic curve Pseudorandom Number Generator as WiFi protected access 2 security key generator. In Proceedings of the 2nd International Conference on Business and Information Management (pp. 23-28). Association for Computing Machinery. https://doi.org/10.1145/3278252.3278262
Type
Conference paperISBN
978-1-4503-6545-1Keywords
Schlagwort
Collections
- Conference Papers [14]
Verwandte Dokumente
Anzeige der Dokumente mit ähnlichem Titel, Autor, Urheber und Thema.
-
Analysis of key randomness in improved one-time pad cryptography
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and ... -
A Novel approach for determining distributed generations penetration level using Least Square Minimization (LSM) curve fitting
Dosano, Rodel D.; Mabaquiao, Nemia H.; Gallega-Hisole, Godelyn ; Cabacas, Regin A. ; Ra, In-Ho (Fuji Technology Press Ltd., 2016-09-01)With the publicized benefits offered by renewable energy resources, more and more households embrace the utilization of stand-alone installations ranging from small to medium scale systems. In literature, several studies ... -
A rule-based fuzzy diagnostics decision support system for tuberculosis
Semogan, April Rose C.; Gerardo, Bobby D.; Tanguilig, Bartolome T. III; de Castro, Joel T.; Cervantes, Louie F. (IEEE, 2011-11-03)The system is specialized for pulmonary physicians focusing on tuberculosis and for patients already diagnosed with tuberculosis. The main focus for the development of the system is on the architecture and algorithm used ...