Key-Dependent Weak IVs and Weak Keys in WEP : How to Trace Conditions Back to Their Patterns(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
The WEP (Wired Equivalent Privacy) is a part of IEEE802.11 standard designed for protecting over the air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The attack was then extended and implemented as WEP cracking tools. The key recovery attacks can basically be prevented by skipping certain IVs (Initial Values) called weak IVs, but the problem is that there exist huge amount of key-dependent weak IVs and the patterns of them have not been fully identified yet. The difficult part is that a naive approach to identify the key-dependent weak IVs requires the exhaustive search of IVs and WEP keys, and hence is infeasible. On the other hand, it might be feasible to skip the key-dependent weak IVs for the currently set WEP key but this reveals information on the WEP key from the skipped patterns. To skip them safely, the patterns of the key-dependent weak IVs must be identified in the first place. In this paper, we analyze the famous condition for IVs and WEP keys to be weak in the FMS attack, i.e. 0≤S[1]≤t'<t and S[1]+S[S[1]]=t (cf. Sect. 2.3 for more details), and then trace it back to the patterns of IVs and WEP keys theoretically. Once such patterns are obtained, their safe skip patterns can be obtained by using them.
- 2006-08-01
著者
-
Kobara Kazukuni
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Kobara Kazukuni
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Imai Hideki
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
関連論文
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Unconditionally Secure Chaffing-and-Winnowing
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- IVs to Skip for Immunizing WEP against FMS Attack
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Tag-KEM from Set Partial Domain One-Way Permutations
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Formulation of Key Privacy in Plaintext Checking Attack Model
- Key-Dependent Weak IVs and Weak Keys in WEP : How to Trace Conditions Back to Their Patterns(Information Security)
- Strong Anonymous Signature
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- Combining Public Key Encryption with Keyword Search and Public Key Encryption
- Wolf Attack Probability : A Theoretical Security Measure in Biometric Authentication Systems
- Strength of interaction for information distribution and generalized Wigner-Araki-Yanase theorem
- A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum (特集:量子計算と量子情報)
- About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4
- Wolf fingerprints against minutiae count matching systems
- A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum