Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP
スポンサーリンク
概要
- 論文の詳細を見る
In recent years, wireless LAN systems are widely used in campuses, offices, homes and so on. It is important to discuss the security aspect of wireless LAN networks in order to protect data confidentiality and integrity. The IEEE Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). However, these protocols have vulnerability for secure communication. In 2008, we proposed an efffective key recovery attack against WEP and it is called the TeAM-OK attack. In this paper, first, we present a different interpretation and the relation between other attacks and the TeAM-OK attack against WEP. Second, we present some existing attacks against WPA-TKIP and these attacks are not executable in a realistic environment. Then we propose an attack that is executable in a realistic environment against WPA-TKIP. This attack exploits the vulnerability implementation in the QoS packet processing feature of IEEE 802.11e. The receiver receives a falsification packet constructed as part of attack regardless of the setting of IEEE 802.11e. This vulnerability removes the attackers condition that access points support IEEE 802.11e. We confirm that almost all wireless LAN implementations have this vulnerability. Therefore, almost all WPA-TKIP implementations cannot protect a system against the falsification attack in a realistic environment.
論文 | ランダム
- 中等科学教科書の歴史的分析 : 執筆者集団との関わりから(I-1 カリキュラム)
- IH-1 我が国の一般成人の科学・技術理解と中等理科教育 : 「科学技術に関する意識調査」結果 (第一報)
- 前期中等科学教育における「省エネルギー」の取り扱いに関する研究 : アメリカ・イギリス・ドイツの教科書の比較分析を通して
- 前期中等科学教育における「省エネルギー」の取り扱いに関する研究 : アメリカ・イギリス・ドイツの教科書の比較分析を通して
- 1D02 オーストラリアにおける初等教育・前期中等科学教育改革 : ナショナル・カリキュラムを中心に