09-11-2023, 03:57 PM
Hello, I am writing a Computer Science essay for school.
My research question is: "How does the security of the WPA2-PSK (Personal) wireless security standard, with TKIP encryption, compare to WPA2-PSK with CCMP encryption, against brute force decryption attempts targeting the authentication handshake exchanged between the client and the access point, for different types of passwords, in terms of time complexity?"
My essay is still at the drafting stage, however, I have collected all the cracking data I need with Hashcat. I have made randomly generated passwords with increasing strengths and used my dd-wrt router to ensure that they would only be TKIP or CCMP to avoid any errors. The results were very interesting, I found out that there is a very small difference between TKIP and CCMP cracking time. (I should mention that the router used TKIP 128-bit, and CCMP 128-bit respectively). I can't figure out if this is becasuse hashcat targets the handshake and not the cipherstream, or simply because I made a big mistake in my process. However, I tried multiple times to verify whether this was true and the cracking times for CCMP are only around 2.5% higher than those for TKIP
My research question is: "How does the security of the WPA2-PSK (Personal) wireless security standard, with TKIP encryption, compare to WPA2-PSK with CCMP encryption, against brute force decryption attempts targeting the authentication handshake exchanged between the client and the access point, for different types of passwords, in terms of time complexity?"
My essay is still at the drafting stage, however, I have collected all the cracking data I need with Hashcat. I have made randomly generated passwords with increasing strengths and used my dd-wrt router to ensure that they would only be TKIP or CCMP to avoid any errors. The results were very interesting, I found out that there is a very small difference between TKIP and CCMP cracking time. (I should mention that the router used TKIP 128-bit, and CCMP 128-bit respectively). I can't figure out if this is becasuse hashcat targets the handshake and not the cipherstream, or simply because I made a big mistake in my process. However, I tried multiple times to verify whether this was true and the cracking times for CCMP are only around 2.5% higher than those for TKIP