A wpa shared key cracking system based on gpu cluster

A GPU cluster, shared key technology, applied in the field of password cracking, can solve the problems of low cracking speed, poor scalability, limited cracking ability, etc., to achieve the effect of improving cracking speed, load balancing, and improving cracking performance

Active Publication Date: 2016-11-23
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the technical problems of low cracking speed, limited cracking ability and poor scalability of the password cracking system in the prior art, the present invention discloses a WPA shared key cracking system based on GPU clusters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wpa shared key cracking system based on gpu cluster
  • A wpa shared key cracking system based on gpu cluster
  • A wpa shared key cracking system based on gpu cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] A WLAN contains at least one wireless access point AP and one user (client). The WPA / WPA2-PSK authentication process is a four-step handshake process. The client generates a verification value MIC through the input key, AP name (SSID), user MAC address, random number Nonce and other data and sends it to the AP. Compare with the stored correct MIC value, if they are consistent, the identity authentication will be passed, otherwise it will be rejected. The main difference between WPA and WPA2 is that WPA uses the HMAC-MD5 algorithm in the last step of generating the MIC value, while WPA2 uses the HMAC-SHA1 algorithm. Therefore, the method of the present invention is applicable to WPA and WPA2.

[0024] A GPU cluster is a cluster system based on GPU computing nodes, and its main computing work is completed by the GPU of ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of password cracking. The invention discloses a WPA shared key cracking system based on a GPU cluster, which specifically includes a control node and a plurality of GPU computing nodes; The module extracts the cracking feature value, and the user interaction module of the control node receives the range of the cracked password defined by the user; the password space division module divides a certain range of password intervals for each GPU computing node, and sends them to each corresponding GPU computing node; The GPU computing node calculates the temporary verification parameter MIC_TMP. When the temporary verification parameter MIC_TMP is the same as the verification parameter MIC value, it is considered that the cracked password passphrase is a shared key, and the password cracking is completed. The present invention uses GPU clusters to crack WPA / WPA2-PSK passwords, supports multi-node GPU clusters, can be appropriately expanded according to requirements, and better improves cracking performance. At the same time, it designs a reliable The advanced task scheduling system now load balances and improves the cracking speed.

Description

technical field [0001] The invention relates to the technical field of password cracking, in particular to a GPU cluster-based WPA shared key cracking system. Background technique [0002] In recent years, with the rapid development of mobile terminals such as smart phones and tablet computers, the development of WLAN (Wireless Local Area Network) has also been extremely rapid, and there is even a tendency to replace wired networks as the main way to access the Internet. Therefore, WLAN has also become an important target of investigation and evidence collection. [0003] The WLAN standard IEEE 802.11 stipulates protection schemes for wireless network data: WEP, WPA and WPA2. Among them, WEP is the earliest solution, which has been found to have many loopholes and can be successfully attacked in a short period of time. Therefore, WPA or WPA2 is generally used for WLAN protection now. WPA / WPA2 adopts two identity authentication methods: shared key PSK (Pre-Share Key) authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 吉庆兵于飞兰天张李军
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products