SECURE PASSWORD MANAGEMENT AND WPA CRACKING: A DUAL APPROACH LEVERAGING CRYPTOGRAPHIC DESIGN AND HIGH-PERFORMANCE COMPUTING

Authors

  • Himansu Pandey Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Aryan Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Sahil Aukta Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Sudesh Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad

DOI:

https://doi.org/10.29121/granthaalayah.v12.i11.2024.6124

Keywords:

Password, Wpa, Cryptographic, Implementation, User-Friendly

Abstract [English]

This project presents a dual-focused investigation into secure password management and high-performance cryptographic analysis. The first part involves the design and implementation of a secure, user-friendly password manager that employs strong encryption, multi-factor authentication (MFA), auto-fill features, and secure cloud synchronization. This system aims to mitigate security risks associated with weak or reused credentials by offering advanced password generation, storage, and retrieval capabilities.
The second part of the project evaluates the efficiency of the Cell Broadband Engine (Cell BE) processor—most notably used in the PlayStation 3—for brute-force WPA password cracking. This includes in-depth studies of WPA vulnerabilities, brute-force attack algorithms, and the adaptation of cryptographic procedures to leverage the parallel architecture of the Cell BE. By applying the adapted A³ development model, which integrates application requirements, algorithm design, and architecture-specific implementation, the project explores the performance potential and practical feasibility of using Cell BE for cryptographic operations. The findings demonstrate both the effectiveness of the password manager in real-world use and the capability of the Cell BE architecture in accelerating WPA brute-force cracking tasks.

Downloads

Download data is not yet available.

References

Aircrack-ng Team. (2008). Aircrack-ng introduction. Retrieved November 1, 2008, from http://aircrack-ng.org/doku.php

WiFi Alliance. (2007). About the alliance. Retrieved October 13, 2008, from http://www.wi-fi.org/about_overview.php

Ashink. (2007, December 11). Sony Playstation used to crack password. Hacking Truths. Retrieved October 13, 2008, from http://www.hungry-hackers.com/2007/12/sony-playstation-used-to-crack-password.html

Bader, D. A. (2007). Web page of Cell programming workshop. Retrieved December 3, 2008, from http://sti.cc.gatech.edu/programming.html

Bjerrum, B., Kristensen, J. T., & Kristiansen, K. D. (2007). Noise reduction for hands-free car phone. Retrieved from http://kom.aau.dk/group/07gr840/turnin/

Borisov, N., Goldberg, I., & Wagner, D. (2001). Security of the WEP algorithm. Retrieved November 14, 2008, from

Buttari, A., Luszczek, P., Kurzak, J., Dongarra, J., & Bosilca, G. (2007). SCOP3 – A Rough Guide to Scientific Computing on the Playstation 3. University of Tennessee, Knoxville. Retrieved February 18, 2009, from http://www.netlib.org/utk/people/JackDongarra/PAPERS/scop3.pdf

Chabala, G. (2007). How to install Fedora Core 6 on your Playstation 3. Retrieved February 19, 2009, from http://gregchabala.com/computer/playstation3/howto-linux-on-ps3.php

Combs, G. (2008). About Wireshark. Retrieved March 9, 2009, from http://www.wireshark.org/about.html

Fixstars. (2008). 8 node PS3 cluster. Retrieved December 2, 2008, from http://us.fixstars.com/store/index.php?submit=software&submitimg[hardware][solutions]=1

Fleishman, G. (2008, November 6). Battered, but not broken: Understanding the WPA crack. Ars Technica. Retrieved December 18, 2008, from http://arstechnica.com/security/news/2008/11/wpa-cracked.ars

Fluhrer, S., Mantin, I., & Shamir, A. (2001). Weaknesses in the Key Scheduling Algorithm of RC4. In Proceedings of the 4th Annual Workshop on Selected Areas of Cryptography, 1–24. DOI: https://doi.org/10.1007/3-540-45537-X_1

Gans, J. S., King, S. P., & Wright, J. (2005). Wireless communications. Retrieved November 1, 2008, from http://profile.nus.edu.sg/fass/ecsjkdw/WirelessCommunications_Final.pdf

George, R. (2008, May 21). Lockheed breaks WPA-encrypted wireless network with 8 clustered Sony Playstations. Retrieved December 2, 2008, from http://www.networkcomputing.com/blog/dailyblog/archives/2008/05/lockheed_breaks.html

Hulton, D. (2007). Hacking the airwaves with FPGAs. Retrieved February 17, 2009, from http://openciphers.sourceforge.net/slides/shmoocon-2007.pdf

IBM. (2008). Cell Broadband Engine Technology. Retrieved January 21, 2009, from http://www-03.ibm.com/technology/cell/

IBM. (2009). Los Alamos National Lab’s Roadrunner. Retrieved June 10, 2009, from http://www.ibm.com/ibm/ideasfromibm/us/roadrunner/20080609/index.shtml

IBM Systems and Technology Group. (2007). Cell Broadband Engine Programming Handbook, Version 1.1. Retrieved from http://www.ibm.com/chips/techlib/techlib.nsf/techdocs/

Martin, I. (2002). RC4. Retrieved November 25, 2008, from http://www.wisdom.weizmann.ac.il/~itsik/RC4/rc4.html

Johnston, J. (2009). The Newlib Project. Retrieved February 1, 2009, from http://sourceware.org/newlib/

Kramer, M. (2008, April 16). Lockheed Martin opens wireless cyber security lab. Reuters. Retrieved December 2, 2008, from http://www.reuters.com/article/pressRelease/idUS172500+16-Apr-2008+PRN20080416

Lal, S., & Warar, S. K. (2007). SDR Implementation of a Multi-carrier Transmitter with Link Adaptation. Technical Report, Aalborg University.

Lehembre, G. (2006). Bezpecnost Wi-Fi – WEP, WPA a WPA2. Hakin9.org. Retrieved November 10, 2008, from www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_CZ.pdf

Marcos. (2009). Aircrack-ng WPA optimalizace pro SSE2 procesory. Retrieved April 19, 2009, from http://airdump.cz/aircrackng-sse2-procesor/

Martin, C. (2008, October 23). Wi-Fi Security – How to Secure Your Wi-Fi Network. Retrieved October 28, 2008, from http://www.aboutonlinetips.com/wi-fi-security-how-to-secure-your-wi-fi-network/

Blazek, M. (2007). Implementace skrytých Markovovských modelů na procesoru Cell. Technical Report, Czech Technical University in Prague.

Peterka, J. (1992). Little Endian vs. Big Endian. Retrieved April 15, 2009, from http://www.earchiv.cz/a92/a237c120.php3

Puzmanova, R. (2007). Bezpecnost WiFi záleží jen na vás. Lupa. Retrieved November 17, 2008, from http://www.lupa.cz/clanky/bezpecnost-wifi-zalezi-jen-na-vas/

Reed, B. (2008, May 19). Inside Lockheed Martin’s Wireless Security Lab. Retrieved December 2, 2008, from http://www.networkworld.com/news/2008/051908-lockheed-martin-wireless-security-lab.html

Robbins, D. (2000). POSIX Threads Explained. Retrieved February 5, 2009, from http://www.ibm.com/developerworks/linux/library/l-posix1.html

Simonsen, P. A., & Kristensen, J. T. (2007). DS-CDMA Procedures with Cell Broadband Engine. Technical Report, Aalborg University.

Mercury Computer Systems. (2006). Malý superpočítač s procesorem Cell BE do PCIe x16 slotu. Retrieved March 18, 2009, from http://www.cdr.cz/a/18155

Vasicek, O. (2007, May 9). WEP – Zabezpečení sítě WiFi. Technical Report, Czech Technical University in Prague. Retrieved October 15, 2008, from http://radio.feld.cvut.cz/personal/mikulak/MK/MK07_semestralky/wi-fi_zabezpeceni_wep.pdf

Vondruska, P. (2002). Crypto-World. Retrieved March 15, 2009, from http://crypto-world.info/casop4/crypto78_02.pdf

Vyroubal, M. (2008). Wi-Fi Protected Access. Retrieved November 25, 2008, from http://wi-fi.unas.cz/wpa.php

Wikipedia. (2002). SHA Hash Functions. Retrieved on 2009-03-20

Downloads

Published

2024-11-30

How to Cite

Himansu Pandey, Aryan, Aukta, S., & Sudesh. (2024). SECURE PASSWORD MANAGEMENT AND WPA CRACKING: A DUAL APPROACH LEVERAGING CRYPTOGRAPHIC DESIGN AND HIGH-PERFORMANCE COMPUTING. International Journal of Research -GRANTHAALAYAH, 12(11), 69–81. https://doi.org/10.29121/granthaalayah.v12.i11.2024.6124