首页> 外文会议>International Conference on Information Science and Control Engineering >A Method for Cracking the Password of WPA2-PSK Based on SA and HMM
【24h】

A Method for Cracking the Password of WPA2-PSK Based on SA and HMM

机译:基于SA和HMM的WPA2-PSK密码破解方法

获取原文

摘要

Password recovery of WPA2-PSK is an important problem in digital forensics. Since the encryption mechanism of WPA-PSK is gradually enhanced, it is difficult to deal with this problem by the traditional methods such as brute force, rainbow table, Markov model, and so on. In this paper, we give a new method based on simulated annealing (SA) and hidden markov model (HMM). The main principle of this method is to create the hidden markov model of the known password based on the SA which could be used to generate the password candidates in the wireless network password recovery. It means that the passwords are given by a probability learning of the known password. The tests have shown that this approach could improve the effectiveness of password recovery for the wireless network, comparing with the Markov model which has been shown much more efficiently than the traditional methods such as brute force and dictionary attack.
机译:WPA2-PSK的密码恢复是数字取证中的重要问题。由于WPA-PSK的加密机制逐渐增强,因此很难通过蛮力,彩虹表,马尔可夫模型等传统方法来解决此问题。在本文中,我们给出了一种基于模拟退火(SA)和隐马尔可夫模型(HMM)的新方法。该方法的主要原理是基于SA创建已知密码的隐藏马尔可夫模型,该模型可用于在无线网络密码恢复中生成候选密码。这意味着密码是通过对已知密码的概率学习来给出的。测试表明,与马尔可夫模型相比,这种方法可以提高无线网络密码恢复的有效性,而马尔可夫模型已被证明比传统方法(如蛮力和字典攻击)更有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号