Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
نویسندگان
چکیده
Temporal Key Integrity Protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in Wired Equivalent Privacy (WEP) Protocol. TKIP adds four new algorithms to WEP: a Message Integrity Code (MIC) called Michael, an Initialization Vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the S-box used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. V.Moen, H.Raddum and K.J.Hole pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is also discussed.
منابع مشابه
Security of IEEE 802.11 considering Power and EM Side-Channel Information
This paper introduces the side-channel perspective on wireless security. We assume an attacker is able to measure the power consumption or the electromagnetic emanation of cryptographic operations performed at the access point or at the station. Under this assumption, we review standards for wireless security like WEP as defined in IEEE 802.11b, and TKIP as defined in IEEE 802.11i. We furthermo...
متن کاملA Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
This paper proposes a highly efficient cryptographic denial of service attack against 802.11 networks using 802.11i TKIP and CCMP. The attacker captures one frame, then modifies and transmits it twice to disrupt network access for 60 seconds. We analyze, implement and experimentally validate the attack. We also propose a robust solution and recommendations for network administrators.
متن کاملBurglarproof WEP Protocol on Wireless Infrastructure
With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...
متن کاملSecurity Analysis of Michael: The IEEE 802.11i Message Integrity Code
The latest IEEE 802.11i uses a keyed hash function, called Michael, as the message integrity code. This paper describes some properties and weaknesses of Michael. We provide a necessary and sufficient condition for finding collisions of Michael. Our observation reveals that the collision status of Michael only depends on the second last block message and the output of the block function in the ...
متن کاملEnhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol
IEEE 802.11-2007 Standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. PreRSNA algorithms are the algorithms used before RSNA. PreRSNA security comprises the algorithms; WEP (Wired Equivalent Privacy) and IEEE 802.11 entity authentication. RSNA security comprises the algorithms like TKIP, CCMP, RSNA establishment and termination procedures, including use of IEEE ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2006 شماره
صفحات -
تاریخ انتشار 2006