Table 2 - uploaded by Zuhal Tanrikulu
Content may be subject to copyright.
WEP / WPA / WPA2 Key Strength: User Given Passphrase Strength

WEP / WPA / WPA2 Key Strength: User Given Passphrase Strength

Source publication
Article
Full-text available
This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's e...

Contexts in source publication

Context 1
... passphrases are another kind of 'user password' and have the same vulnerabilities as traditional user passwords. A brute force attack analysis of the mentioned passphrases is outlined in Table 2. ...
Context 2
... using 63-character passphrases, which are created using 26-character sets or higher, even higher calculated values are possible. These values have no practical significance and are reduced to 3.67174306 × 10 57 years on the last line of Table 2. Considering the duration of crack times, it is assumed that using a combination of key strength and a chosen character set is safe if it takes longer than 89.78 years to decipher the key; this is the greatest "average life expectancy of a human at birth" among all the countries [12]. ...

Similar publications

Article
Full-text available
The large number of devices characterizing Wireless Sensor Networks (WSNs) provide the benefits of observing, tracking, and recording everything; nonetheless, the cumulative computing power of those devices is typically not utilized, and the few implementations taking advantage of it neglect privacy or are application-specific. This manuscript desc...
Article
Full-text available
This paper describes the 128-bit AES algorithm based on interleaving technique in order to reduce the logic elements used in encryption and decryption. The logic elements reduced from 38386 of the existing AES to 6386. AES is one of the widely used security algorithm for Network Security. Due to the presence of brute force attack, there is chance o...
Article
Full-text available
In crypto-biometric system (CBS), biometric is combined with cryptography. In CBS, either accessing a cryptographic key is controlled with biometric or the key is generated from biometric features. This work is related to the latter approach in CBS. In such a system, protecting the privacy of the biometric data is an important concern. Further, the...
Article
Full-text available
In these modern globally connected world, with the internet growing continually, the exchange of information over the web has made the data quite vulnerable. The need for data security is thus increasing exponentially day by day. Cryptography is the science of devising methods that allow for information to be sent in a secure form in such a way tha...
Article
Full-text available
In the last years, mobile commerce have appeared thanks to the growth in the use of mobile devices, multiple wireless technology for personal communication and program language such as Java. A parallel step has been the design of new mobile payment protocols that provide strong security because the financial data is transmitted over wireless networ...

Citations

... Much emphasis has been laid on the need to implement security on wireless networks, but low emphasis has been placed on the effect of the security protocols on the performance of wireless network. (Tasoluk and Tanrikulu, 2011) showed that security protocols use encryption keys to secure information which might take a long time for a hacker to crack. These keys are usually used for authentication and cryptography when a client is trying to connect to a wireless network, and it involves exchanging of keys between an access point and the client. ...
Conference Paper
We present MultiNet, a novel method for securely associating devices with a domestic wireless network. We show that MultiNet has usability benefits over currently deployed commercial solutions while being backwards compatible with existing devices. MultiNet reduces the interaction overhead of secure association by focusing on users' interactions rather than the network's requirements. This leads to a novel architectural arrangement of the home network infrastructure: the network is dynamically re-configured to accept each pre-configured device, rather than the current norm where each device is configured to be acceptable to the pre-configured network. Assuming devices are pre-configured for a unique, device-specific network name and passphrase, MultiNet constructs an out-of-band visual channel via an intermediary network controller device to convey the device's configuration to the network. This makes the interaction to join a device to the wireless network lightweight and identical across all devices, considerably reducing the interaction overheads for users.