Smashing WEP in A Passive Attack
1
Smashing WEP in A Passive Attack POUYAN SEPEHRDAD PETR SUSIL - - PowerPoint PPT Presentation
Smashing WEP in A Passive Attack POUYAN SEPEHRDAD PETR SUSIL SERGE VAUDENAY MARTIN VUAGNOUX 1 2 No one Uses WEP Any More. 2 Hotels No one Uses WEP Any More. Restaurants Airports 2 Wireless Networks in Singapore: 20% WEP Hotels No
1
2
2
2
2
3
3
3
3
3
3
4
1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for
5
1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for
5
1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for
6
1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for
7
1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for
8
1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:
8: end loop
9
1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:
8: end loop
9
1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:
8: end loop
10
1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:
8: end loop
11
12
12
k[3] ... k[15] z1 z2 z3 ...
k[0] k[1] k[2]
13
k[3] ... k[15] z1 z2 z3 ...
k[0] k[1] k[2]
13
k[3] ... k[15] z1 z2 z3 ...
k[0] k[1] k[2]
13
k[3] ... k[15] z1 z2 z3 ...
k[0] k[1] k[2]
the same for each packet encryption. WEP is vulnerable.
13
14
14
15
15
15
Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj
15
Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj
row reference ¯ f ¯ g p i A u15 2 − σi St[i] = 0, z2 = 0 P 1
fixed−j
15
Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj
row reference ¯ f ¯ g p i A u15 2 − σi St[i] = 0, z2 = 0 P 1
fixed−j
Roos, A.: A class of weak keys in RC4 stream cipher.
1995
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4.
2001
Wagner, D.: Weak keys in RC4.
1995
Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11.
2001
Korek: Next generation of WEP attacks?
2004
Vaudenay, S., Vuagnoux, M.: Passive–only Key Recovery Attacks on RC4
2007
Mantin, I.: A practical attack on the fixed RC4 in the WEP mode.
2005
Klein, A.: Attacks on the RC4 stream cipher.
2006
Devine, C., Otreppe, T.: Aircrack-ng
2004
Martin, J.I.S.: Weplab
2004
Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
2002
Tews, E., Weinmann, R., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds.
2007
Beck, M., Tews, E. Practical Attacks Against WEP and WPA.
2009
Sepehrdad, P., Susil, P., Vaudenay, S., Vuagnoux, M.: Smashing WEP in a Passive Attack
2013
Roos, A.: A class of weak keys in RC4 stream cipher.
1995
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4.
2001
Wagner, D.: Weak keys in RC4.
1995
Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11.
2001
Korek: Next generation of WEP attacks?
2004
Vaudenay, S., Vuagnoux, M.: Passive–only Key Recovery Attacks on RC4
2007
Mantin, I.: A practical attack on the fixed RC4 in the WEP mode.
2005
Klein, A.: Attacks on the RC4 stream cipher.
2006
Devine, C., Otreppe, T.: Aircrack-ng
2004
Martin, J.I.S.: Weplab
2004
Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
2002
Tews, E., Weinmann, R., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds.
2007
Beck, M., Tews, E. Practical Attacks Against WEP and WPA.
2009
Sepehrdad, P., Susil, P., Vaudenay, S., Vuagnoux, M.: Smashing WEP in a Passive Attack
2013
17
1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯
k15 in L15 do
4:
run recursive attack on input ¯ k15
5: end for 6: stop: attack failed
recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):
7: If input is only ¯
k15, set i = 3.
8: if i ≤ imax then 9:
compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}
10:
truncate Li to its first ρi terms
11:
for each ¯ ki in Li do
12:
run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)
13:
end for
14: else 15:
for each ¯ kimax+1, . . . , ¯ k14 do
16:
test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct
17:
end for
18: end if
17
1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯
k15 in L15 do
4:
run recursive attack on input ¯ k15
5: end for 6: stop: attack failed
recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):
7: If input is only ¯
k15, set i = 3.
8: if i ≤ imax then 9:
compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}
10:
truncate Li to its first ρi terms
11:
for each ¯ ki in Li do
12:
run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)
13:
end for
14: else 15:
for each ¯ kimax+1, . . . , ¯ k14 do
16:
test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct
17:
end for
18: end if
17
1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯
k15 in L15 do
4:
run recursive attack on input ¯ k15
5: end for 6: stop: attack failed
recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):
7: If input is only ¯
k15, set i = 3.
8: if i ≤ imax then 9:
compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}
10:
truncate Li to its first ρi terms
11:
for each ¯ ki in Li do
12:
run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)
13:
end for
14: else 15:
for each ¯ kimax+1, . . . , ¯ k14 do
16:
test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct
17:
end for
18: end if
18
18
19
We made a heuristic assumption that V (Ygood) ⇥ V (Ybad). In practice: V (Ygood) ⇤= V (Ybad) We made a heuristic approximation that (Ygood Yi)’s are independent for all bad i’s. In practice: (Ygood Yi)’s are not independent. Assume the rank R of the correct counter to be normally distributed. In practice: R is not normally distributed. Assume R is following Poisson distribution. In practice E(R) ⇤= V (R).
0.05 0.1 0.15 0.2 0.25 10 20 30 40 50 Probability R3 Realization Polya distribution with p = 0.9839 and r = 0.356 Experimental R3 distribution for 5000 packets
20
George Pólya
(1887-1985)
(Advisory Committee on Weather Control, Washington D. C.)
The Frequency oI Hail Occurrence
By
Summary. Hail occurrence, being a comparatively rare event, is fit well by the Poisson distribution providing the hail storms are independent. When this condition is not met, hail occurrence follows the negative binomial distri-
given which determines whether the Poisson distribution may be used, or whether the negative binomial is necessary, The parameter of the Poisson distribution is always estimated efficiently by the method of moments. The parameters
are 0nly efficiently estimated by the method
under certain conditions; when the method of moments fails, the method of maximum likelihood must be employed. A criterion to determine when this method must be used is given together with the method
presented are illustrated by application to several hail records. Zusammeufassung. Unter der Voraussetzung, da[3 die Hagelfiille von- einander unabhiingig sind, kann das Auftreten dieses verh~Itnism~l~ig sel- tenen Ereignisses gut dutch eine Foissonsche Verteilung dargestellt werden; ist dies nicht der Fall, dann folgt es einer negativ binomischen Verteilung. Es wird clue Testmethode mitgeteilt, naeh welcher man entscheiden kann,
ist. Die [Parameter der Poissonschen Verteilung kSnnen mit der Methode der Momente immer zuverl~ssig bestimmt
der negativ bingmischen Verteilung j edoeh kSnnen mit dieser Methode nut unter bestimm- ten Umst~nden ermittelt werden. Falls die Methode der Momente versagt, ist die IViethode der grSl]tcn Wahrscheinlichkeit anzuwenden. Ein Kriterium zur Entscheidung, warm diese Methode angewendet werden muG, sowie eine Methode zur Ermittlung geniiherter Werte werden mitgeteilt. Die beschrie- benen statistischen Methoden werden durch Anwendung auf einige Hagel- beobaehtungsreihen erl~iutert. R6sum6. En adrnettant que les chutes de gr@le sont ind~pendantes les unes des autres, on peut eonvenablement repr6senter leur apparition par une distribution de frdquenees de Poisson. Si ee n'est pas le eas, ces chutes ob@issent une distribution bino.miale n@gative. L'auteur propose un test permettant
13
George Pólya
(1887-1985)
730
MONTHLY WEATHER REVIEW
OCTOBER-DECEMBER
1963
TORNADO PROBABILITIES
H.
. THOM
Office o
f Climatology, US.
Weather Bureau, Washington D.C. Manuscript received July 2
, 1963; revised August 7, 19631
ABSTRACT
The frequency distributions of tornado path width and length are developed using data series from Iowa and Kansas. Direction of path and annual frequency are discussed.
It is found that all but about 1 percent of Iowa tornadoes had path directions toward the northeast and southeast
indicating that the climatological series is formed from a Polya stochastic process. This resembles the situation for other types of storms where the events tend to cluster. A new map of annual frequency for the United States is presented for the period 1953-62, during which it is believed tornado observation was fairly stable. The expected value of tornado area is derived from the area distribution. From this and the annual frequency, the probability From these, the distribution of path area is derived.
There have been a large number of studies of tornado climatology, most of which have been simply counts of tornadoes for various areas and time periods. Asp [I] lists 78 references, a few of which are not climatological in nature; not all references have been listed. Many of these studies have recognized the possible incompleteness
but little could be done to correct this deficiency. So far
as is known, none of these studies made a direct attack
In 1945, William F. Kuffel, then of the Dubuque Fire Marine Insurance Company, asked the writer to develop a system of limiting the loss from a single tornado in a given region for the purpose of preventing liabilities from exceeding reserve funds. This resulted in a limited study for several Iowa counties [a] in ivhich the direction fre- quency and path length and width distributions were
devised within whose bounds the insured liability could be totaled. I
f this exceeded a certain limit related to
the reserves o f the company, the excess could be reinsured with other companies. It should be noted that the
to be taken care of by the ordinary risk of the business which is not well defined in this type of insurance coverage. By 1957, these ideas had developed further [3], and after mathematical distributions were fitted to the path length and width it was possible to determine the prob- ability of a tornado striking a point. There still remained a bothersome correlation between path length and width which was not easily taken into account in the area
tion to the distribution problem. In 1958, Battan [4] presented a simple frequency diagram of path length, but his objective was to study the duration of a tornado, not its probability of occurrence. In the present study, we introduce distribution theory which provides a better fit to the basic data and makes possible a more satisfactory solution to the area distribu- tion problem. The distribution of annual frequency is also discussed and several comparisons of data are made, together with a number of statistical tests for homogeneity.
Since path width and length cannot be negative, zero must be the lower bound of any distribution assumed, although this need not be a greatest lower bound. As with a number of other physical variables, where the true bound is certainly near zero, but cannot be established
to be different from zero, it has proven convenient to
assume that the distribution has a zero lower bound. Also, in this instance, it would appear that both variables should have a probability density of zero at the origin, for as the path length and width approach their greatest lower bounds, the probability density should approach zero. In previous studies [3], a gamma distribution was as-
zero probability density at the origin. When fitted to length and width data, both variables gave shape param- eter estimates which indicated non-zero densities at the
did not fit the data series particularly well.
George Pólya
(1887-1985)
22
ARP Packet 0xAA DSAP 0xAA SSAP 0x03 CTRL 0x00 0x00 ORG Code 0x00 0x08 ARP 0x06 0x00 Ethernet 0x01 0x08 IP 0x00 0x06 Hardware size 0x04 Protocol 0x00 Opcode Request/Reply 0x?? 0x?? MAC addr src 0x?? 0x?? 0x?? 0x?? 0x?? 0x?? IP src 0x?? 0x?? 0x?? 0x?? MAC addr dst 0x?? 0x?? 0x?? 0x?? 0x?? TCP/IPv4 Packet 0xAA DSAP 0xAA SSAP 0x03 CTRL 0x00 0x00 ORG Code 0x00 0x08 IP 0x00 0x45 IP Version + Header length 0x00 Type of Service 0x?? Packet length 0x?? 0x?? IP ID RFC815 0x?? 0x40 Fragment type and offset 0x?? 0x?? TTL 0x06 TCP type 0x?? Header checksum 0x?? 0x?? IP src 0x?? 0x?? 0x?? 0x?? IP dst 0x?? 0x?? 0x?? 0x?? Port src 0x?? 0x?? Port dst 0x??
23
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 10000 15000 20000 25000 30000 35000 40000 45000 50000 Success Probability Number of Packets Aircrack-ng-Patched Active Aircrack-ng-Original Active Aircrack-ng-Patched Passive
24
24