2004
DOI: 10.1145/997122.997132
|View full text |Cite
|
Sign up to set email alerts
|

Weaknesses in the temporal key hash of WPA

Abstract: This article describes some weaknesses in the key scheduling in Wi-Fi Protected Access (WPA) put forward to secure the IEEE standard 802.11-1999. Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key. This is not a practical attack on WPA, but it shows that parts of WPA are weak on their own. Using this attack it is possible to do a TK recovery attack on WPA with complexity O (2 105 ) compared to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 2 publications
0
30
0
Order By: Relevance
“…Basically, WPA is a WEP wrapper which contains anti-replay protections and a key management scheme to avoid key reuse. In 2004, Moen, Raddum and Hole [24] discovered that the recovery of at least two RC4 packet keys in WPA leads to a full recovery of the temporal key and the message integrity check key. The complexity of this attack is defined by the exhaustive search of two 104-bit long keys, i.e.…”
Section: Theoretical Key Recovery Attacks On Wpamentioning
confidence: 99%
“…Basically, WPA is a WEP wrapper which contains anti-replay protections and a key management scheme to avoid key reuse. In 2004, Moen, Raddum and Hole [24] discovered that the recovery of at least two RC4 packet keys in WPA leads to a full recovery of the temporal key and the message integrity check key. The complexity of this attack is defined by the exhaustive search of two 104-bit long keys, i.e.…”
Section: Theoretical Key Recovery Attacks On Wpamentioning
confidence: 99%
“…Supplicant and the AP [11,12].The Procedure begin by sending of Message1 from AP to Supplicant. The AP generates ANonce which is a random number, starts a Sequence Number and encapsulates these inside Message1.…”
Section: -Way Handshakementioning
confidence: 99%
“…The mechanism defined by IEEE 802.11i is vulnerable to memory exhaustion attacks [11], [13], [14] and DoS flooding .So, to handle these types of attacks we need to develop some security mechanisms. The weakness of 4-way handshake phase of 802.11i standard is the first message that is Message1 because of not using any MIC field in order to guarantee the message integrity.…”
Section: Dos and Memory Exhaustion Attacks On 4-way Handshakementioning
confidence: 99%
See 1 more Smart Citation
“…Supplicant and the AP [11,12]. First step is the procedure begin by sending of Message1 from AP to Supplicant.…”
Section: Four-way Handshakementioning
confidence: 99%