Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns -

نویسندگان

  • Kazukuni Kobara
  • Hideki Imai
چکیده

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The attack was then extended and implemented as WEP cracking tools. The key recovery attacks can basically be prevented by skipping certain IVs (Initial Values) called weak IVs, but the problem is that there exist huge amount of key-dependent weak IVs and the patterns of them have not been fully identified yet. The difficult part is that a naive approach to identify the key-dependent weak IVs requires the exhaustive search of IVs and WEP keys, and hence is infeasible. On the other hand, it might be feasible to skip the key-dependent weak IVs for the currently set WEP key but this reveals information on the WEP key from the skipped patterns. To skip them safely, the patterns of the key-dependent weak IVs must be identified in the first place. In this paper, we analyze the famous condition for IVs and WEP keys to be weak in the FMS attack, i.e. 0 ≤ S [1] ≤ t′ < t and S [1] + S [S [1]] = t (cf. Sect. 2.3 for more details), and then trace it back to the patterns of IVs and WEP keys theoretically. Once such patterns are obtained, their safe skip patterns can be obtained by using them. key words: RC4, WEP, IEEE802.11, WLAN, FMS attack

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IVs to Skip for Immunizing WEP against FMS Attack

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive ...

متن کامل

Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i

Temporal Key Integrity Protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in Wired Equivalent Privacy (WEP) Protocol. TKIP adds four new algorithms to WEP: a Message Integrity Code (MIC) called Michael, an Initialization Vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de...

متن کامل

Comparison of Various Wlan Securities

As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the field of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. WLANs are also playing much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes fo...

متن کامل

Weaknesses in the Key Scheduling Algorithm of RC4

In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probability. We use these weak keys to construct new distinguishers for RC4, and to mount related key attac...

متن کامل

Comparison TTLS and PEAP Comparison by Matthew Gast

Broadly speaking, the history of 802.11 security is an attempt to address two major problems. The first problem is that the protocols used to authenticate network users were not strong, so unauthorized users could easily access network resources. Second, the Wired Equivalent Privacy (WEP) system proved insufficient for a number of wellpublicized reasons. Our white paper “What’s Wrong With WEP?”...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 89-A  شماره 

صفحات  -

تاریخ انتشار 2006