SlideShare uma empresa Scribd logo
1 de 14
Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics
THE IMRAD STRUCTURE
Introduction
Methods
Results
Discussion/Conclusion
The main structure used when writing a scientific article is
IMRAD. It usually consists of the following items:
• Introduction –Why was the study undertaken?What was
the research question, the tested hypothesis or the
purpose of the research?
• Methods –When, where, and how was the study done?
What materials were used or who was included in the
study groups (patients, etc.)?
• Results –What answer was found to the research
question; what did the study find?Was the tested
hypothesis true?
• Discussion –What might the answer imply and why does
it matter? How does it fit in with what other researchers
have found?What are the perspectives for future
research?
TITLE
•Title of the article being studied –
«Dragonblood: Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd»
•It uses terms such asWPA3(WiFi
ProtectedAccess) and EAP-pwd
(ExtensibleAuthentication Protocol -
Password), that are often used in the
field of information security,
networking and network security
ABSTRACT
•Abstract section in this paper
describes the importance and
relevance of this article. It
contains brief statements about
the work done in this article.The
importance of the article is
shown in the prevalence of the
use of theWPA3 and EAP-pwd
protocols, as well as in the cost
of reproducing some
vulnerabilities.
INTRODUCTION
• As for the first part of IMRAD structure, this part contains a more
detailed description of the sections discussed in the work and authors
hypothesis about WPA3 security. Also, the contribution of the authors to
the finalization of the 802.11ax standard is presented at the end. It can
be useful to determine if the paper is useful for your work or not.
INTRODUCTION(BACKGROUND)
• As a part of Introduction,
Background shows us the
theoretical part of the
paper, including algorithms
that were used inWPA3
Dragonfly Handshake.This
part may be interested to
those people who want to
thoroughly understand how
the protocolsWPA3 and
EAP-pwd work. Also, the
comparison withWPA2 is
presented.
METHODS
•In this section authors describe their methodology, and
evaluate the security of EAP-pwd andWPA3-SAE
implementations.
METHODS(ATTACKS)
The structure of the main part differs from that of the IMRAD,
as it presents not only the methods used to carry out each
attack, but also the results for each section. It can be useful for
people that are looking for information for certain attack type.
RELATEDWORK
• This part(which is not
included in the standard
IMRAD structure) describes
other works, related with
that paper, what helped the
author to conduct research.
It will be useful for those
people who want to find
additional information on
the topic of the article
without looking through the
list of references.
CONCLUSION AND RECOMMENDATIONS
•Combining the results and
discussion parts, this part, describes
the authors thoughts about the
work done, as well as summarize
the results of the safety assessment
of the studied standards. Here you
can find a link to a list of
improvements that are supposed to
be used when updating the
standards
ACKNOWLEDGMENTS
This part shows us people and organizations that helped
authors to write their paper. You may use this information to
find out about help that you can get for your researches. This
part is not used in the standard IMRAD structure.
REFERENCES
For those people who
want to delve into the
essence of the article, a
table of contents is
presented. Sources are
listed in alphabetical
order of surnames, in
APA format
APPENDIX
This part contains
information in greater
detail than
can be presented in the
methods part(for
example, experiment
graphs and source
code), but
which may be of
interest to a few people
working
specifically in the field
of wireless network
security.
Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics

Mais conteúdo relacionado

Semelhante a ZatinshchikovSV_M112201_Dragonblood_v2.pptx

Publishing in high impact factor journals
Publishing in high impact factor journalsPublishing in high impact factor journals
Publishing in high impact factor journalsMohamed Alrshah
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSguest84285f
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSEWG-DSS
 
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 1  Abstract—Autonomous Vehicles (AV) are expected to.docx 1  Abstract—Autonomous Vehicles (AV) are expected to.docx
1  Abstract—Autonomous Vehicles (AV) are expected to.docxShiraPrater50
 
An in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPAn in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPIRJET Journal
 
Dynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanDynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanQaiser Khan
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)ijp2p
 
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Christo Ananth
 
SCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSharmilaDevi90
 
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Christo Ananth
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Christo Ananth
 
Review of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationReview of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationIRJET Journal
 
What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...nooriasukmaningtyas
 
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...PhD Assistance
 
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionA web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionIRJET Journal
 
Embedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsEmbedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsJim Downing
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...IRJET Journal
 

Semelhante a ZatinshchikovSV_M112201_Dragonblood_v2.pptx (20)

Publishing in high impact factor journals
Publishing in high impact factor journalsPublishing in high impact factor journals
Publishing in high impact factor journals
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSS
 
Towards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSSTowards a Collaboration Network for the EWG-DSS
Towards a Collaboration Network for the EWG-DSS
 
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 1  Abstract—Autonomous Vehicles (AV) are expected to.docx 1  Abstract—Autonomous Vehicles (AV) are expected to.docx
1  Abstract—Autonomous Vehicles (AV) are expected to.docx
 
An in-depth review on News Classification through NLP
An in-depth review on News Classification through NLPAn in-depth review on News Classification through NLP
An in-depth review on News Classification through NLP
 
Dynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar KhanDynamic Spectrum Access by Qaisar Khan
Dynamic Spectrum Access by Qaisar Khan
 
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)
 
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
Call for Papers- Volume 7, Issue 4, August 2022, International Journal of Adv...
 
SCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdfSCOPUS PAPER EJMCM.pdf
SCOPUS PAPER EJMCM.pdf
 
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
Call for Papers- Volume 7, Issue 6, December 2022, International Journal of A...
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
Call for Papers- Volume 7, Issue 5, October 2022, International Journal of Ad...
 
Review of Topic Modeling and Summarization
Review of Topic Modeling and SummarizationReview of Topic Modeling and Summarization
Review of Topic Modeling and Summarization
 
What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...What network simulator questions do users ask? a large-scale study of stack o...
What network simulator questions do users ask? a large-scale study of stack o...
 
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
Major Guidelines and Formatting Structure for Writing Computer Science PhD Di...
 
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition ExtractionA web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition Extraction
 
Paper review
Paper reviewPaper review
Paper review
 
Embedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing DocumentsEmbedding Metadata In Word Processing Documents
Embedding Metadata In Word Processing Documents
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...
 

Último

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 

Último (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 

ZatinshchikovSV_M112201_Dragonblood_v2.pptx

  • 1. Dragonblood:Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd Author: Zatinschikov S.V., 1st year Master’s degree in Information and communication technologies and communication systems student, Faculty of Radio andTelevision, Educational program in Security and software protection of infocommunications, MTUCI. Advisor: DzhabrailovaV.S., PhD, Associate professor at the department of Philosophy, History and Cross-cultural Communication, MTUCI Ministry for Digital Development, Communications and Mass Media of the Russian Federation Federal State Budgetary Educational Institution of Higher Professional Education Moscow Technical University of Communications and Informatics
  • 2. THE IMRAD STRUCTURE Introduction Methods Results Discussion/Conclusion The main structure used when writing a scientific article is IMRAD. It usually consists of the following items: • Introduction –Why was the study undertaken?What was the research question, the tested hypothesis or the purpose of the research? • Methods –When, where, and how was the study done? What materials were used or who was included in the study groups (patients, etc.)? • Results –What answer was found to the research question; what did the study find?Was the tested hypothesis true? • Discussion –What might the answer imply and why does it matter? How does it fit in with what other researchers have found?What are the perspectives for future research?
  • 3. TITLE •Title of the article being studied – «Dragonblood: Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd» •It uses terms such asWPA3(WiFi ProtectedAccess) and EAP-pwd (ExtensibleAuthentication Protocol - Password), that are often used in the field of information security, networking and network security
  • 4. ABSTRACT •Abstract section in this paper describes the importance and relevance of this article. It contains brief statements about the work done in this article.The importance of the article is shown in the prevalence of the use of theWPA3 and EAP-pwd protocols, as well as in the cost of reproducing some vulnerabilities.
  • 5. INTRODUCTION • As for the first part of IMRAD structure, this part contains a more detailed description of the sections discussed in the work and authors hypothesis about WPA3 security. Also, the contribution of the authors to the finalization of the 802.11ax standard is presented at the end. It can be useful to determine if the paper is useful for your work or not.
  • 6. INTRODUCTION(BACKGROUND) • As a part of Introduction, Background shows us the theoretical part of the paper, including algorithms that were used inWPA3 Dragonfly Handshake.This part may be interested to those people who want to thoroughly understand how the protocolsWPA3 and EAP-pwd work. Also, the comparison withWPA2 is presented.
  • 7. METHODS •In this section authors describe their methodology, and evaluate the security of EAP-pwd andWPA3-SAE implementations.
  • 8. METHODS(ATTACKS) The structure of the main part differs from that of the IMRAD, as it presents not only the methods used to carry out each attack, but also the results for each section. It can be useful for people that are looking for information for certain attack type.
  • 9. RELATEDWORK • This part(which is not included in the standard IMRAD structure) describes other works, related with that paper, what helped the author to conduct research. It will be useful for those people who want to find additional information on the topic of the article without looking through the list of references.
  • 10. CONCLUSION AND RECOMMENDATIONS •Combining the results and discussion parts, this part, describes the authors thoughts about the work done, as well as summarize the results of the safety assessment of the studied standards. Here you can find a link to a list of improvements that are supposed to be used when updating the standards
  • 11. ACKNOWLEDGMENTS This part shows us people and organizations that helped authors to write their paper. You may use this information to find out about help that you can get for your researches. This part is not used in the standard IMRAD structure.
  • 12. REFERENCES For those people who want to delve into the essence of the article, a table of contents is presented. Sources are listed in alphabetical order of surnames, in APA format
  • 13. APPENDIX This part contains information in greater detail than can be presented in the methods part(for example, experiment graphs and source code), but which may be of interest to a few people working specifically in the field of wireless network security.
  • 14. Dragonblood:Analyzing the Dragonfly Handshake ofWPA3 and EAP-pwd Author: Zatinschikov S.V., 1st year Master’s degree in Information and communication technologies and communication systems student, Faculty of Radio andTelevision, Educational program in Security and software protection of infocommunications, MTUCI. Advisor: DzhabrailovaV.S., PhD, Associate professor at the department of Philosophy, History and Cross-cultural Communication, MTUCI Ministry for Digital Development, Communications and Mass Media of the Russian Federation Federal State Budgetary Educational Institution of Higher Professional Education Moscow Technical University of Communications and Informatics