Interesting People mailing list archives
Re: Graphic cards as Wi-Fi crypto crackers
From: David Farber <dave () farber net>
Date: Sun, 12 Oct 2008 18:03:41 -0400
Begin forwarded message: From: Christian Huitema <huitema () windows microsoft com> Date: October 12, 2008 5:46:22 PM EDT To: "dave () farber net" <dave () farber net>, ip <ip () v2 listbox com> Subject: RE: [IP] Graphic cards as Wi-Fi crypto crackers
I hadn't seen any mention of this issue here, so I thought I'd pass it along. The story is that graphics cards' GPUs have been used to massively speed brute force cracking of Wi-Fi (WPA) crypto keys. http://www.dslreports.com/shownews/Using-GPUs-To-Speed-Up-WPA-Hacks- 98321 I definitely agree that the devil is in the details, and details are sorely lacking. But keeping on eye on this attack vector clearly makes sense.
The paper describes a brute force attack against WPA keys. Normally, a brute force attack should not succeed against the 128 bit keys, so the attack has to concentrate on the human element. The 128 keys are derived from a "pass phrase". The attack works by trying to guess the passphrase. The eventual success of the attack depends a lot on how the pass phrase is generated, and what methods are used to copy the pass phrase between computers.
The simplest systems ask the users to enter a passphrase. People- generated passwords, or even pass phrases, are notoriously weak. You will be happy if you get 40 bits of entropy. Such people generated passwords are no match for a serious computer, even less a network of computers using the parallel processing powers of their GPU.
The "good" pass phrases are the ones generated by computers, but the strength of the computer generated phrases is limited by the "human vector". You can only pile up so much complexity before humans find the phrase impossible to remember. Even if you accept that people will write it down on paper, there are still limits of the complexity you can pile up before the human-copying errors become too frequent to properly manage.
WPA and WPA2 are not the only system that combine a secret password or passphrase with some kind of public hash used for verification. All of these systems are vulnerable to elaborate "dictionary" attacks, in which attackers use combination of words from dictionaries, digits, and the occasional special characters. If the password or passphrase was generated by a human, it is most certainly already broken. If the passphrase can be remembered by a human, it is probably broken. If the passphrase can be copied by a human, it is suspect.
-- Christian Huitema ------------------------------------------- Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.com/member/archive/rss/247/ Powered by Listbox: http://www.listbox.com
Current thread:
- Graphic cards as Wi-Fi crypto crackers David Farber (Oct 12)
- <Possible follow-ups>
- Re: Graphic cards as Wi-Fi crypto crackers David Farber (Oct 12)
- Re: Graphic cards as Wi-Fi crypto crackers David Farber (Oct 12)
- Re: Graphic cards as Wi-Fi crypto crackers David Farber (Oct 12)