Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i

نویسندگان

  • Wei Han
  • Dong Zheng
  • Kefei Chen
چکیده

Temporal Key Integrity Protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in Wired Equivalent Privacy (WEP) Protocol. TKIP adds four new algorithms to WEP: a Message Integrity Code (MIC) called Michael, an Initialization Vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the S-box used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. V.Moen, H.Raddum and K.J.Hole pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is also discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of IEEE 802.11 considering Power and EM Side-Channel Information

This paper introduces the side-channel perspective on wireless security. We assume an attacker is able to measure the power consumption or the electromagnetic emanation of cryptographic operations performed at the access point or at the station. Under this assumption, we review standards for wireless security like WEP as defined in IEEE 802.11b, and TKIP as defined in IEEE 802.11i. We furthermo...

متن کامل

A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP

This paper proposes a highly efficient cryptographic denial of service attack against 802.11 networks using 802.11i TKIP and CCMP. The attacker captures one frame, then modifies and transmits it twice to disrupt network access for 60 seconds. We analyze, implement and experimentally validate the attack. We also propose a robust solution and recommendations for network administrators.

متن کامل

Burglarproof WEP Protocol on Wireless Infrastructure

With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...

متن کامل

Security Analysis of Michael: The IEEE 802.11i Message Integrity Code

The latest IEEE 802.11i uses a keyed hash function, called Michael, as the message integrity code. This paper describes some properties and weaknesses of Michael. We provide a necessary and sufficient condition for finding collisions of Michael. Our observation reveals that the collision status of Michael only depends on the second last block message and the output of the block function in the ...

متن کامل

Enhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol

IEEE 802.11-2007 Standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. PreRSNA algorithms are the algorithms used before RSNA. PreRSNA security comprises the algorithms; WEP (Wired Equivalent Privacy) and IEEE 802.11 entity authentication. RSNA security comprises the algorithms like TKIP, CCMP, RSNA establishment and termination procedures, including use of IEEE ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006