Practical Side-Channel Attacks against WPA-TKIP
Autor: | Domien Schepers, Mathy Vanhoef, Aanjhan Ranganathan |
---|---|
Rok vydání: | 2019 |
Předmět: |
Computer science
business.industry Temporal Key Integrity Protocol 020206 networking & telecommunications 02 engineering and technology Adversary Computer security computer.software_genre Encryption GeneralLiterature_MISCELLANEOUS Cipher 0202 electrical engineering electronic engineering information engineering Key (cryptography) 020201 artificial intelligence & image processing Message authentication code Side channel attack business computer |
Zdroj: | AsiaCCS |
DOI: | 10.1145/3321705.3329832 |
Popis: | We measure the usage of cipher suites in protected Wi-Fi networks, and do this for several distinct geographic areas. Surprisingly, we found that 44.81% of protected networks still support the old WPA-TKIP cipher. Motivated by this, we systematically analyze the security of several implementations of WPA-TKIP, and present novel side-channel attacks against them. The presented attacks bypass existing countermeasures and recover the Michael message authentication key in 1 to 4 minutes. Using this key, an adversary can then decrypt and inject network traffic. In contrast, previous attacks needed 7 to 8 minutes. These results stress the urgent need to stop using WPA-TKIP. |
Databáze: | OpenAIRE |
Externí odkaz: |