dc.contributor.author |
Islam, Ikramul |
|
dc.contributor.author |
Barai, Suvendu |
|
dc.contributor.author |
Moon, Md. Ahosanul Haque |
|
dc.date.accessioned |
2021-10-12T03:45:36Z |
|
dc.date.available |
2021-10-12T03:45:36Z |
|
dc.date.issued |
2020-01-24 |
|
dc.identifier.uri |
http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/6246 |
|
dc.description.abstract |
The scale of wireless network and the number of wireless devices are increasing day by day. Prevention of
unauthorized access to protect the data in wireless network has become a vital part of wireless security.
Wi-Fi alliance announced WPA3 as successor to WPA2 after the 'Key Reinstallation Attack' was run
against WPA2. WPA3 uses Dragonfly handshake for mutual authentication between a client and an Access
Point. But a serious vulnerability named side channel timing leak was found in the password conversion
method of Dragonfly Handshake. MODP group has taken into consideration for the conversion of password
element because dragonfly supports both MODP and ECC group. Any attacker in the range of a Wi-Fi
network can run a brute- force dictionary attack using the leaked timing information. In this work, a method
has proposed and designed to reduce the Timing Based Side Chanel Attack. This method is consist of three
different parts: Fixing number of iterations, Generation of a database of Password Element, Random choice
of a Password Element from the database. Leaked Timing Information Creation of the signature of
password has been illustrated. Finally, the complications for an attacker to hack the password are stated. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
Daffodil International University |
en_US |
dc.subject |
Wireless communication systems--Security measures |
en_US |
dc.subject |
Information storage and retrieval systems |
en_US |
dc.title |
Reduced Side Channel Timing Attack in Dragonfly Handshake of WPA3 for MODP Group |
en_US |
dc.type |
Other |
en_US |