Distinguishing WPA

نویسندگان

  • Sourav Sengupta
  • Subhamoy Maitra
  • Willi Meier
چکیده

We present an efficient algorithm that can distinguish the keystream of WPA from that of a generic instance of RC4 with a packet complexity of O(N), where N denotes the size of the internal permutation of RC4. In practice, our distinguisher requires approximately 2 packets; thus making it the best known distinguisher of WPA to date. This is a significantly improved distinguisher than the previous WPA distinguisher identified by Sepehrdad, Vaudenay and Vuagnoux in Eurocrypt 2011, which requires more than 2 packets in practice. The motivation of our distinguisher arises from the recent observations on WPA by AlFardan, Bernstein, Paterson, Poettering and Schuldt, and this work puts forward an example how an experimental bias may lead to an efficient theoretical distinguisher.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Statistical Attack on RC4 - Distinguishing WPA

In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4000 packets by assuming that the first bytes of plaintext are known for each packet. We describe similar attacks for WPA. Firstly, we describe a distinguisher for WPA of complexity 243 and advantage 0.5 which uses 240 packets. Then, ba...

متن کامل

Tornado Attack on RC4 with Applications to WEP & WPA

In this paper, we construct several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless communication protocol WEP and a key recovery and a distinguishing attack against WPA. This was achieved through a huge amount of theoretical and experimental analysis (capturing WiFi packet...

متن کامل

WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?

Significant weaknesses in the Wired Equivalency Protocol (WEP) led to the creation of the Wi-Fi Protected Access (WPA) Wired Local Area Network (WLAN) security protocol and the amendment to that protocol, WPA2. Certified by the WiFi Alliance in 2001, WPA[1] was superseded by WPA2 in 2006[1] as being mandatory for usage with the IEEE 802.11i standard for specifying security for wireless networks...

متن کامل

Secular trends and correlates of physical activity: The Tromsø Study 1979-2008

BACKGROUND The aim was to describe secular trends in leisure time physical activity (LTPA) and work related physical activity (WPA) from 1979 to 2008. Additionally, we explored potential cross-sectional and longitudinal correlates of LTPA and WPA. METHODS Data are collected from 34,898 individuals (49.7% men) aged >20 years who participated in at least one Tromsø Study survey between 1979 and...

متن کامل

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA

The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 key. In this paper, we provide a disciplined study of RC4 biases resulting specifically in such a scenario. Motivated by the work of AlFardan et al. (2013), we first prove the interesting sawtooth ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013