[144796] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Practical attack on WPA?

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Mon Aug 31 12:13:18 2009

From: Jerry Leichter <LEICHTER@LRW.COM>
To: Cryptography List <cryptography@metzdowd.com>
Date: Fri, 28 Aug 2009 10:56:10 -0400

h=
ttp://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsi=
fication%20Attack%20on%20WPA.pdf

A Practical Message Falsi=EF=AC=81cation Attack on WPA
Toshihiro Ohigashi and Masakatu Morii

Abstract. In 2008, Beck and Tews have proposed a practical attack on
WPA. Their attack (called the Beck-Tews attack) can recover plaintext
from an encrypted short packet, and can falsify it. The execution time
of the Beck-Tews attack is about 12-15 minutes. However, the attack
has the limitation, namely, the targets are only WPA implementations
those support IEEE802.11e QoS features. In this paper, we propose a
practical message falsi=EF=AC=81cation attack on any WPA implementation. =
In
order to ease targets of limitation of wireless LAN products, we apply
the Beck-Tews attack to the man-in-the-middle attack. In the man-in-
the-middle attack, the user=E2=80=99s communication is intercepted by an =
=20
attacker
until the attack ends. It means that the users may detect our attack =20
when
the execution time of the attack is large. Therefore, we give methods =20=

for
reducing the execution time of the attack. As a result, the execution =20=

time
of our attack becomes about one minute in the best case.

                                                         -- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post