skip to main content
article

Weaknesses in the temporal key hash of WPA

Published:01 April 2004Publication History
Skip Abstract Section

Abstract

This article describes some weaknesses in the key scheduling in Wi-Fi Protected Access (WPA) put forward to secure the IEEE standard 802.11-1999. Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key. This is not a practical attack on WPA, but it shows that parts of WPA are weak on their own. Using this attack it is possible to do a TK recovery attack on WPA with complexity O(2105) compared to a brute force attack with complexity O (2128).

References

  1. IEEE Std 802.11, Standards for Local and Metropolitan Area Networks: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.]]Google ScholarGoogle Scholar
  2. Airsnort, airsnort.shmoo.com/]]Google ScholarGoogle Scholar
  3. N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. MOBICOM, July 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of rc4. Eighth Annual Workshop on Selected Areas in Cryptography, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Housley, D. Whiting, and N. Ferguson. Alternate temporal key hash. IEEE doc. 802.11-02/282r2, April 2002.]]Google ScholarGoogle Scholar
  6. N. Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE doc. 802.11-2/020r0, January 2002.]]Google ScholarGoogle Scholar
  7. IEEE Std 802.1X, Standards for Local and Metropolitan Area Networks: Port-Based Access Control, 2001.]]Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGMOBILE Mobile Computing and Communications Review
    ACM SIGMOBILE Mobile Computing and Communications Review  Volume 8, Issue 2
    April 2004
    83 pages
    ISSN:1559-1662
    EISSN:1931-1222
    DOI:10.1145/997122
    Issue’s Table of Contents

    Copyright © 2004 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 April 2004

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader