The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
Share
Abstract
WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate the strength of WPA2 default passwords generated by the algorithms embedded in routers using a simulated brute-force attack. The findings ascertain the prevalence of insecurities in the default WPA2 passwords due to low charset size and weak encryption algorithm. For these reasons, we propose Blum-Blum-Shub Elliptic Curve Pseudorandom Number Generator (BBS-ECPRNG) algorithm as a replacement to the algorithms embedded in routers. To prove its validity, we generated distinct sequences of 10 6 bits each and analyzed sequence output using the NIST statistical test suite. The generated bit sequence of BBS-ECPRNG was converted to password characters and subjected to simulation test. Findings reveal that the BBS-ECPRNG password significantly decreased the password-cracking success by 25 times more as compared to the default WPA2 passwords generated by router-based algorithms in the Philippine market.
Recommended Citation
Omorog, C. D., Gerardo, B. D., & Medina, R. P. (2018, September). The performance of blum-blum-shub elliptic curve Pseudorandom Number Generator as WiFi protected access 2 security key generator. In Proceedings of the 2nd International Conference on Business and Information Management (pp. 23-28). Association for Computing Machinery. https://doi.org/10.1145/3278252.3278262
Type
Conference paperISBN
978-1-4503-6545-1Keywords
Subject
Collections
- Conference Papers [14]
Related items
Showing items related by title, author, creator and subject.
-
Analysis of key randomness in improved one-time pad cryptography
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and ... -
The Philippine party-list system and representation of marginalized populations
Bionat, Justin Francis (College of Law, West Visayas State University, 2021)The Party-list system is a unique aspect of the Philippine political system; a political battleground designed to ensure a representative democracy that allows for ample and proportional representation of marginalized ... -
Differentiated instruction and performance in numeracy skills of kindergartners
Casalmer, Glycer E. (West Visayas State University, 2018-04)This quasi-experimental study was an attempt to determine the use of Differentiated Instruction in determining the performance of kindergartners in their numeracy skills using the quasi-experimental method. The participants ...