SECURE PASSWORD MANAGEMENT AND WPA CRACKING: A DUAL APPROACH LEVERAGING CRYPTOGRAPHIC DESIGN AND HIGH-PERFORMANCE COMPUTING
DOI:
https://doi.org/10.29121/granthaalayah.v12.i11.2024.6124Keywords:
Password, Wpa, Cryptographic, Implementation, User-FriendlyAbstract [English]
This project presents a dual-focused investigation into secure password management and high-performance cryptographic analysis. The first part involves the design and implementation of a secure, user-friendly password manager that employs strong encryption, multi-factor authentication (MFA), auto-fill features, and secure cloud synchronization. This system aims to mitigate security risks associated with weak or reused credentials by offering advanced password generation, storage, and retrieval capabilities.
The second part of the project evaluates the efficiency of the Cell Broadband Engine (Cell BE) processor—most notably used in the PlayStation 3—for brute-force WPA password cracking. This includes in-depth studies of WPA vulnerabilities, brute-force attack algorithms, and the adaptation of cryptographic procedures to leverage the parallel architecture of the Cell BE. By applying the adapted A³ development model, which integrates application requirements, algorithm design, and architecture-specific implementation, the project explores the performance potential and practical feasibility of using Cell BE for cryptographic operations. The findings demonstrate both the effectiveness of the password manager in real-world use and the capability of the Cell BE architecture in accelerating WPA brute-force cracking tasks.
Downloads
References
Aircrack-ng Team. (2008). Aircrack-ng introduction. Retrieved November 1, 2008, from http://aircrack-ng.org/doku.php
WiFi Alliance. (2007). About the alliance. Retrieved October 13, 2008, from http://www.wi-fi.org/about_overview.php
Ashink. (2007, December 11). Sony Playstation used to crack password. Hacking Truths. Retrieved October 13, 2008, from http://www.hungry-hackers.com/2007/12/sony-playstation-used-to-crack-password.html
Bader, D. A. (2007). Web page of Cell programming workshop. Retrieved December 3, 2008, from http://sti.cc.gatech.edu/programming.html
Bjerrum, B., Kristensen, J. T., & Kristiansen, K. D. (2007). Noise reduction for hands-free car phone. Retrieved from http://kom.aau.dk/group/07gr840/turnin/
Borisov, N., Goldberg, I., & Wagner, D. (2001). Security of the WEP algorithm. Retrieved November 14, 2008, from
Buttari, A., Luszczek, P., Kurzak, J., Dongarra, J., & Bosilca, G. (2007). SCOP3 – A Rough Guide to Scientific Computing on the Playstation 3. University of Tennessee, Knoxville. Retrieved February 18, 2009, from http://www.netlib.org/utk/people/JackDongarra/PAPERS/scop3.pdf
Chabala, G. (2007). How to install Fedora Core 6 on your Playstation 3. Retrieved February 19, 2009, from http://gregchabala.com/computer/playstation3/howto-linux-on-ps3.php
Combs, G. (2008). About Wireshark. Retrieved March 9, 2009, from http://www.wireshark.org/about.html
Fixstars. (2008). 8 node PS3 cluster. Retrieved December 2, 2008, from http://us.fixstars.com/store/index.php?submit=software&submitimg[hardware][solutions]=1
Fleishman, G. (2008, November 6). Battered, but not broken: Understanding the WPA crack. Ars Technica. Retrieved December 18, 2008, from http://arstechnica.com/security/news/2008/11/wpa-cracked.ars
Fluhrer, S., Mantin, I., & Shamir, A. (2001). Weaknesses in the Key Scheduling Algorithm of RC4. In Proceedings of the 4th Annual Workshop on Selected Areas of Cryptography, 1–24. DOI: https://doi.org/10.1007/3-540-45537-X_1
Gans, J. S., King, S. P., & Wright, J. (2005). Wireless communications. Retrieved November 1, 2008, from http://profile.nus.edu.sg/fass/ecsjkdw/WirelessCommunications_Final.pdf
George, R. (2008, May 21). Lockheed breaks WPA-encrypted wireless network with 8 clustered Sony Playstations. Retrieved December 2, 2008, from http://www.networkcomputing.com/blog/dailyblog/archives/2008/05/lockheed_breaks.html
Hulton, D. (2007). Hacking the airwaves with FPGAs. Retrieved February 17, 2009, from http://openciphers.sourceforge.net/slides/shmoocon-2007.pdf
IBM. (2008). Cell Broadband Engine Technology. Retrieved January 21, 2009, from http://www-03.ibm.com/technology/cell/
IBM. (2009). Los Alamos National Lab’s Roadrunner. Retrieved June 10, 2009, from http://www.ibm.com/ibm/ideasfromibm/us/roadrunner/20080609/index.shtml
IBM Systems and Technology Group. (2007). Cell Broadband Engine Programming Handbook, Version 1.1. Retrieved from http://www.ibm.com/chips/techlib/techlib.nsf/techdocs/
Martin, I. (2002). RC4. Retrieved November 25, 2008, from http://www.wisdom.weizmann.ac.il/~itsik/RC4/rc4.html
Johnston, J. (2009). The Newlib Project. Retrieved February 1, 2009, from http://sourceware.org/newlib/
Kramer, M. (2008, April 16). Lockheed Martin opens wireless cyber security lab. Reuters. Retrieved December 2, 2008, from http://www.reuters.com/article/pressRelease/idUS172500+16-Apr-2008+PRN20080416
Lal, S., & Warar, S. K. (2007). SDR Implementation of a Multi-carrier Transmitter with Link Adaptation. Technical Report, Aalborg University.
Lehembre, G. (2006). Bezpecnost Wi-Fi – WEP, WPA a WPA2. Hakin9.org. Retrieved November 10, 2008, from www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_CZ.pdf
Marcos. (2009). Aircrack-ng WPA optimalizace pro SSE2 procesory. Retrieved April 19, 2009, from http://airdump.cz/aircrackng-sse2-procesor/
Martin, C. (2008, October 23). Wi-Fi Security – How to Secure Your Wi-Fi Network. Retrieved October 28, 2008, from http://www.aboutonlinetips.com/wi-fi-security-how-to-secure-your-wi-fi-network/
Blazek, M. (2007). Implementace skrytých Markovovských modelů na procesoru Cell. Technical Report, Czech Technical University in Prague.
Peterka, J. (1992). Little Endian vs. Big Endian. Retrieved April 15, 2009, from http://www.earchiv.cz/a92/a237c120.php3
Puzmanova, R. (2007). Bezpecnost WiFi záleží jen na vás. Lupa. Retrieved November 17, 2008, from http://www.lupa.cz/clanky/bezpecnost-wifi-zalezi-jen-na-vas/
Reed, B. (2008, May 19). Inside Lockheed Martin’s Wireless Security Lab. Retrieved December 2, 2008, from http://www.networkworld.com/news/2008/051908-lockheed-martin-wireless-security-lab.html
Robbins, D. (2000). POSIX Threads Explained. Retrieved February 5, 2009, from http://www.ibm.com/developerworks/linux/library/l-posix1.html
Simonsen, P. A., & Kristensen, J. T. (2007). DS-CDMA Procedures with Cell Broadband Engine. Technical Report, Aalborg University.
Mercury Computer Systems. (2006). Malý superpočítač s procesorem Cell BE do PCIe x16 slotu. Retrieved March 18, 2009, from http://www.cdr.cz/a/18155
Vasicek, O. (2007, May 9). WEP – Zabezpečení sítě WiFi. Technical Report, Czech Technical University in Prague. Retrieved October 15, 2008, from http://radio.feld.cvut.cz/personal/mikulak/MK/MK07_semestralky/wi-fi_zabezpeceni_wep.pdf
Vondruska, P. (2002). Crypto-World. Retrieved March 15, 2009, from http://crypto-world.info/casop4/crypto78_02.pdf
Vyroubal, M. (2008). Wi-Fi Protected Access. Retrieved November 25, 2008, from http://wi-fi.unas.cz/wpa.php
Wikipedia. (2002). SHA Hash Functions. Retrieved on 2009-03-20
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Himansu Pandey, Aryan, Sahil Aukta, Sudesh

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.