Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm
نویسنده
چکیده
Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithm exist to help keep information secure and these algorithms vary in complexity and ability to resist cracking. In this paper we present a hybrid crypto scheme that combines the acclaimed effective in symmetric type of algorithm, AES and the Elliptic Curve Cryptography in Asymmetric algorithm.
منابع مشابه
Pre-shared Key Agreement for Secure Public Wi-Fi
This paper presents a novel pre-shared key (PSK) agreement scheme to establish a secure connection between a Wi-Fi client and access point (AP) without prior knowledge of a password. The standard IEEE 802.11 security method, Robust Security Network Association, widely known as Wi-Fi Protected Access (WPA) and WPA2, derives a shared cryptographic key if and only if a user provides an identical p...
متن کاملSecurity Evaluation of Wireless Network Access Points
The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the aver...
متن کاملA jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control
Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...
متن کاملAn FPGA Architecture for the Recovery of WPA/WPA2 Keys
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy protocol (WEP). WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode as it is the quickest and easiest to configure. It requires ...
متن کاملUsability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots
Passwords have to be secure and usable at the same time, a trade-off that is long known. There are many approaches to avoid this trade-off, e.g., to advice users on generating strong passwords and to reject user passwords that are weak. The same usability/security trade-off arises in scenarios where passwords are generated by machines but exchanged by humans, as is the case in pre-shared key (P...
متن کامل