WPA3已沦陷?解读Dragonblood Vulnerabilities( 五 )

n=len(p)+64

do{

base=H(max(Alice,Bob)|min(Alice,Bob)|password|counter)

temp=KDF-n(base,"DragonflyHuntingAndPecking")

seed=(tempmod(p-1))+1

if((seed^3+a*seed+b)isaquadraticresiduemodp)

then

if(found==0)

then

x=seed

save=base

found=1

fifi

counter=counter+1

}while((found==0)||(counter<=k))

y=sqrt(x^3+ax+b)

if(lsb(y)==lsb(save))

then


推荐阅读