SlideShare una empresa de Scribd logo
1 de 14
Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics
THE IMRAD STRUCTURE
Introduction
Methods
Results
Discussion/Conclusion
The main structure used when writing a scientific article is
IMRAD. It usually consists of the following items:
• Introduction –Why was the study undertaken?What was
the research question, the tested hypothesis or the
purpose of the research?
• Methods –When, where, and how was the study done?
What materials were used or who was included in the
study groups (patients, etc.)?
• Results –What answer was found to the research
question; what did the study find?Was the tested
hypothesis true?
• Discussion –What might the answer imply and why does
it matter? How does it fit in with what other researchers
have found?What are the perspectives for future
research?
TITLE
•Title of the article being studied –
«Dragonblood: Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd»
•It uses terms such asWPA3(WiFi
ProtectedAccess) and EAP-pwd
(ExtensibleAuthentication Protocol -
Password), that are often used in the
field of information security,
networking and network security
ABSTRACT
•Abstract section in this paper
describes the importance and
relevance of this article. It
contains brief statements about
the work done in this article.The
importance of the article is
shown in the prevalence of the
use of theWPA3 and EAP-pwd
protocols, as well as in the cost
of reproducing some
vulnerabilities.
INTRODUCTION
• As for the first part of IMRAD structure, this part contains a more
detailed description of the sections discussed in the work and authors
hypothesis about WPA3 security. Also, the contribution of the authors to
the finalization of the 802.11ax standard is presented at the end. It can
be useful to determine if the paper is useful for your work or not.
INTRODUCTION(BACKGROUND)
• As a part of Introduction,
Background shows us the
theoretical part of the
paper, including algorithms
that were used inWPA3
Dragonfly Handshake.This
part may be interested to
those people who want to
thoroughly understand how
the protocolsWPA3 and
EAP-pwd work. Also, the
comparison withWPA2 is
presented.
METHODS
•In this section authors describe their methodology, and
evaluate the security of EAP-pwd andWPA3-SAE
implementations.
METHODS(ATTACKS)
The structure of the main part differs from that of the IMRAD,
as it presents not only the methods used to carry out each
attack, but also the results for each section. It can be useful for
people that are looking for information for certain attack type.
RELATEDWORK
• This part(which is not
included in the standard
IMRAD structure) describes
other works, related with
that paper, what helped the
author to conduct research.
It will be useful for those
people who want to find
additional information on
the topic of the article
without looking through the
list of references.
CONCLUSION AND RECOMMENDATIONS
•Combining the results and
discussion parts, this part, describes
the authors thoughts about the
work done, as well as summarize
the results of the safety assessment
of the studied standards. Here you
can find a link to a list of
improvements that are supposed to
be used when updating the
standards
ACKNOWLEDGMENTS
This part shows us people and organizations that helped
authors to write their paper. You may use this information to
find out about help that you can get for your researches. This
part is not used in the standard IMRAD structure.
REFERENCES
For those people who
want to delve into the
essence of the article, a
table of contents is
presented. Sources are
listed in alphabetical
order of surnames, in
APA format
APPENDIX
This part contains
information in greater
detail than
can be presented in the
methods part(for
example, experiment
graphs and source
code), but
which may be of
interest to a few people
working
specifically in the field
of wireless network
security.
Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics

Más contenido relacionado

Similar a ZatinshchikovSV_M112201_Dragonblood_v2.pptx

Publishing in high impact factor journals
Publishing in high impact factor journalsPublishing in high impact factor journals
Publishing in high impact factor journalsMohamed Alrshah
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSguest84285f
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSEWG-DSS
 
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 1  Abstract—Autonomous Vehicles (AV) are expected to.docx 1  Abstract—Autonomous Vehicles (AV) are expected to.docx
1  Abstract—Autonomous Vehicles (AV) are expected to.docxShiraPrater50
 
An in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPAn in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPIRJET Journal
 
Dynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanDynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanQaiser Khan
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)ijp2p
 
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Christo Ananth
 
SCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSharmilaDevi90
 
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Christo Ananth
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Christo Ananth
 
Review of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationReview of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationIRJET Journal
 
What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...nooriasukmaningtyas
 
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...PhD Assistance
 
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionA web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionIRJET Journal
 
Embedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsEmbedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsJim Downing
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...IRJET Journal
 

Similar a ZatinshchikovSV_M112201_Dragonblood_v2.pptx (20)

Publishing in high impact factor journals
Publishing in high impact factor journalsPublishing in high impact factor journals
Publishing in high impact factor journals
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSS
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSS
 
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 1  Abstract—Autonomous Vehicles (AV) are expected to.docx 1  Abstract—Autonomous Vehicles (AV) are expected to.docx
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 
An in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPAn in-depth review on News Classification through NLP
An in-depth review on News Classification through NLP
 
Dynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanDynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar Khan
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
 
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
 
SCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdf
 
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
 
Review of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationReview of Topic Modeling and Summarization
Review of Topic Modeling and Summarization
 
What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...
 
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
 
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionA web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition Extraction
 
Paper review
Paper reviewPaper review
Paper review
 
Embedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsEmbedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing Documents
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...
 

Último

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile EnvironmentVictorSzoltysek
 

Último (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 

ZatinshchikovSV_M112201_Dragonblood_v2.pptx

  • 1. Dragonblood:Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd Author: Zatinschikov S.V., 1st year Master’s degree in Information and communication technologies and communication systems student, Faculty of Radio andTelevision, Educational program in Security and software protection of infocommunications, MTUCI. Advisor: DzhabrailovaV.S., PhD, Associate professor at the department of Philosophy, History and Cross-cultural Communication, MTUCI Ministry for Digital Development, Communications and Mass Media of the Russian Federation Federal State Budgetary Educational Institution of Higher Professional Education Moscow Technical University of Communications and Informatics
  • 2. THE IMRAD STRUCTURE Introduction Methods Results Discussion/Conclusion The main structure used when writing a scientific article is IMRAD. It usually consists of the following items: • Introduction –Why was the study undertaken?What was the research question, the tested hypothesis or the purpose of the research? • Methods –When, where, and how was the study done? What materials were used or who was included in the study groups (patients, etc.)? • Results –What answer was found to the research question; what did the study find?Was the tested hypothesis true? • Discussion –What might the answer imply and why does it matter? How does it fit in with what other researchers have found?What are the perspectives for future research?
  • 3. TITLE •Title of the article being studied – «Dragonblood: Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd» •It uses terms such asWPA3(WiFi ProtectedAccess) and EAP-pwd (ExtensibleAuthentication Protocol - Password), that are often used in the field of information security, networking and network security
  • 4. ABSTRACT •Abstract section in this paper describes the importance and relevance of this article. It contains brief statements about the work done in this article.The importance of the article is shown in the prevalence of the use of theWPA3 and EAP-pwd protocols, as well as in the cost of reproducing some vulnerabilities.
  • 5. INTRODUCTION • As for the first part of IMRAD structure, this part contains a more detailed description of the sections discussed in the work and authors hypothesis about WPA3 security. Also, the contribution of the authors to the finalization of the 802.11ax standard is presented at the end. It can be useful to determine if the paper is useful for your work or not.
  • 6. INTRODUCTION(BACKGROUND) • As a part of Introduction, Background shows us the theoretical part of the paper, including algorithms that were used inWPA3 Dragonfly Handshake.This part may be interested to those people who want to thoroughly understand how the protocolsWPA3 and EAP-pwd work. Also, the comparison withWPA2 is presented.
  • 7. METHODS •In this section authors describe their methodology, and evaluate the security of EAP-pwd andWPA3-SAE implementations.
  • 8. METHODS(ATTACKS) The structure of the main part differs from that of the IMRAD, as it presents not only the methods used to carry out each attack, but also the results for each section. It can be useful for people that are looking for information for certain attack type.
  • 9. RELATEDWORK • This part(which is not included in the standard IMRAD structure) describes other works, related with that paper, what helped the author to conduct research. It will be useful for those people who want to find additional information on the topic of the article without looking through the list of references.
  • 10. CONCLUSION AND RECOMMENDATIONS •Combining the results and discussion parts, this part, describes the authors thoughts about the work done, as well as summarize the results of the safety assessment of the studied standards. Here you can find a link to a list of improvements that are supposed to be used when updating the standards
  • 11. ACKNOWLEDGMENTS This part shows us people and organizations that helped authors to write their paper. You may use this information to find out about help that you can get for your researches. This part is not used in the standard IMRAD structure.
  • 12. REFERENCES For those people who want to delve into the essence of the article, a table of contents is presented. Sources are listed in alphabetical order of surnames, in APA format
  • 13. APPENDIX This part contains information in greater detail than can be presented in the methods part(for example, experiment graphs and source code), but which may be of interest to a few people working specifically in the field of wireless network security.
  • 14. Dragonblood:Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd Author: Zatinschikov S.V., 1st year Master’s degree in Information and communication technologies and communication systems student, Faculty of Radio andTelevision, Educational program in Security and software protection of infocommunications, MTUCI. Advisor: DzhabrailovaV.S., PhD, Associate professor at the department of Philosophy, History and Cross-cultural Communication, MTUCI Ministry for Digital Development, Communications and Mass Media of the Russian Federation Federal State Budgetary Educational Institution of Higher Professional Education Moscow Technical University of Communications and Informatics