Smashing WEP in A Passive Attack POUYAN SEPEHRDAD PETR SUSIL - - PowerPoint PPT Presentation

smashing wep in a passive attack
SMART_READER_LITE
LIVE PREVIEW

Smashing WEP in A Passive Attack POUYAN SEPEHRDAD PETR SUSIL - - PowerPoint PPT Presentation

Smashing WEP in A Passive Attack POUYAN SEPEHRDAD PETR SUSIL SERGE VAUDENAY MARTIN VUAGNOUX 1 2 No one Uses WEP Any More. 2 Hotels No one Uses WEP Any More. Restaurants Airports 2 Wireless Networks in Singapore: 20% WEP Hotels No


slide-1
SLIDE 1

Smashing WEP in A Passive Attack

1

POUYAN SEPEHRDAD PETR SUSIL SERGE VAUDENAY MARTIN VUAGNOUX

slide-2
SLIDE 2

2

slide-3
SLIDE 3

2

No one Uses WEP Any More.

slide-4
SLIDE 4

2

No one Uses WEP Any More.

Airports Hotels Restaurants

slide-5
SLIDE 5

2

No one Uses WEP Any More.

Airports Hotels Restaurants

Wireless Networks in Singapore: 20% WEP Singapore is not alone. The same problem in most Asia.

slide-6
SLIDE 6

RC4

3

slide-7
SLIDE 7

Reminder on RC4

RC4

3

slide-8
SLIDE 8

Reminder on RC4

RC4

RC4/WEP

3

slide-9
SLIDE 9

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP

3

slide-10
SLIDE 10

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP

3

Challenges

slide-11
SLIDE 11

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP Reminder on RC4

3

Challenges

slide-12
SLIDE 12

Key Keystream

KSA PRGA

SN-1

4

slide-13
SLIDE 13

KSA

1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for

5

slide-14
SLIDE 14

KSA

1 2 3 4 5 6 7 8 9 10 11 12 ... 255 i j

1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for

5

slide-15
SLIDE 15

KSA

7 1 2 3 4 5 6 8 9 10 11 12 ... 255 i j

1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for

6

slide-16
SLIDE 16

KSA

7 1 2 3 4 5 6 8 9 10 11 12 ... 255 i j

1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for

7

slide-17
SLIDE 17

KSA

7 12 2 3 4 5 6 8 9 10 11 1 ... 255 i j

1: for i = 0 to N−1 do 2: S[i] ← i 3: end for 4: j ← 0 5: for i = 0 to N−1 do 6: j ← j+S[i]+K[i mod L] 7: swap(S[i],S[j]) 8: end for

8

slide-18
SLIDE 18

PRGA

1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:

  • utput zi = S[S[i]+S[j]]

8: end loop

9

slide-19
SLIDE 19

PRGA

18 3 211 7 81 245 121 5 66 78 189 34 133 ... 32 i j

1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:

  • utput zi = S[S[i]+S[j]]

8: end loop

9

slide-20
SLIDE 20

PRGA

18 7 211 3 81 245 121 5 66 78 189 34 133 ... 32 i j

1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:

  • utput zi = S[S[i]+S[j]]

8: end loop

10

slide-21
SLIDE 21

PRGA

18 7 211 3 81 245 121 5 66 78 189 34 133 ... 32 i j Keystream byte = S[7+3]=S[10]=189

1: i ← 0 2: j ← 0 3: loop 4: i ← i+1 5: j ← j+S[i] 6: swap(S[i],S[j]) 7:

  • utput zi = S[S[i]+S[j]]

8: end loop

11

slide-22
SLIDE 22

Reminder on RC4

RC4

Tornado attack on WEP Challenges Reminder on RC4 RC4/WEP

12

slide-23
SLIDE 23

Reminder on RC4

RC4

Tornado attack on WEP Challenges RC4/WEP RC4/WEP

12

slide-24
SLIDE 24

k[3] ... k[15] z1 z2 z3 ...

RC4

k[0] k[1] k[2]

13

slide-25
SLIDE 25

k[3] ... k[15] z1 z2 z3 ...

RC4

k[0] k[1] k[2]

WEP

13

slide-26
SLIDE 26

k[3] ... k[15] z1 z2 z3 ...

RC4

k[0] k[1] k[2]

WEP

13

slide-27
SLIDE 27

k[3] ... k[15] z1 z2 z3 ...

RC4

k[0] k[1] k[2]

WEP

the same for each packet encryption. WEP is vulnerable.

13

slide-28
SLIDE 28

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP Challenges RC4/WEP

14

slide-29
SLIDE 29

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP Challenges Tornado Attack on WEP

14

slide-30
SLIDE 30

Keystream Key

RC4

15

slide-31
SLIDE 31

? Keystream Key

RC4

15

slide-32
SLIDE 32

? Keystream Key

RC4

15

 Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj

slide-33
SLIDE 33

? Keystream Key

RC4

15

 Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj

row reference ¯ f ¯ g p i A u15 2 − σi St[i] = 0, z2 = 0 P 1

fixed−j

slide-34
SLIDE 34

? Keystream Key

RC4

15

 Conditional biases: pairs of ¯ fj, pj with a predicate ¯ gj Pr[¯ K[i] = ¯ fj(z, clue)|¯ gj(z, clue)] = pj

row reference ¯ f ¯ g p i A u15 2 − σi St[i] = 0, z2 = 0 P 1

fixed−j

22 Biases

slide-35
SLIDE 35

Roos, A.: A class of weak keys in RC4 stream cipher.

1995

Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4.

2001

Wagner, D.: Weak keys in RC4.

1995

Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11.

2001

Korek: Next generation of WEP attacks?

2004

Vaudenay, S., Vuagnoux, M.: Passive–only Key Recovery Attacks on RC4

2007

Mantin, I.: A practical attack on the fixed RC4 in the WEP mode.

2005

Klein, A.: Attacks on the RC4 stream cipher.

2006

Devine, C., Otreppe, T.: Aircrack-ng

2004

Martin, J.I.S.: Weplab

2004

Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.

2002

Tews, E., Weinmann, R., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds.

2007

Beck, M., Tews, E. Practical Attacks Against WEP and WPA.

2009

Sepehrdad, P., Susil, P., Vaudenay, S., Vuagnoux, M.: Smashing WEP in a Passive Attack

2013

slide-36
SLIDE 36

Roos, A.: A class of weak keys in RC4 stream cipher.

1995

Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4.

2001

Wagner, D.: Weak keys in RC4.

1995

Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11.

2001

Korek: Next generation of WEP attacks?

2004

Vaudenay, S., Vuagnoux, M.: Passive–only Key Recovery Attacks on RC4

2007

Mantin, I.: A practical attack on the fixed RC4 in the WEP mode.

2005

Klein, A.: Attacks on the RC4 stream cipher.

2006

Devine, C., Otreppe, T.: Aircrack-ng

2004

Martin, J.I.S.: Weplab

2004

Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.

2002

Tews, E., Weinmann, R., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds.

2007

Beck, M., Tews, E. Practical Attacks Against WEP and WPA.

2009

5500,000 100,000 60,000 40,000 32,700 30,000 19,800

Sepehrdad, P., Susil, P., Vaudenay, S., Vuagnoux, M.: Smashing WEP in a Passive Attack

2013

slide-37
SLIDE 37

Attack on WEP

17

1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯

k15 in L15 do

4:

run recursive attack on input ¯ k15

5: end for 6: stop: attack failed

recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):

7: If input is only ¯

k15, set i = 3.

8: if i ≤ imax then 9:

compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}

10:

truncate Li to its first ρi terms

11:

for each ¯ ki in Li do

12:

run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)

13:

end for

14: else 15:

for each ¯ kimax+1, . . . , ¯ k14 do

16:

test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct

17:

end for

18: end if

slide-38
SLIDE 38

Attack on WEP

17

1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯

k15 in L15 do

4:

run recursive attack on input ¯ k15

5: end for 6: stop: attack failed

recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):

7: If input is only ¯

k15, set i = 3.

8: if i ≤ imax then 9:

compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}

10:

truncate Li to its first ρi terms

11:

for each ¯ ki in Li do

12:

run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)

13:

end for

14: else 15:

for each ¯ kimax+1, . . . , ¯ k14 do

16:

test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct

17:

end for

18: end if

Yx: counter for x R(x): rank of x

slide-39
SLIDE 39

Attack on WEP

17

1: compute the ranking L15 for I = (15) and I0 = {0, 1, 2} 2: truncate L15 to its first ρ15 terms 3: for each ¯

k15 in L15 do

4:

run recursive attack on input ¯ k15

5: end for 6: stop: attack failed

recursive attack with input (¯ k15, ¯ k3, . . . , ¯ ki−1):

7: If input is only ¯

k15, set i = 3.

8: if i ≤ imax then 9:

compute the ranking Li for I = (i) and I0 = {0, . . . , i − 1, 15}

10:

truncate Li to its first ρi terms

11:

for each ¯ ki in Li do

12:

run recursive attack on input (¯ k15, ¯ k3, . . . , ¯ ki−1, ¯ ki)

13:

end for

14: else 15:

for each ¯ kimax+1, . . . , ¯ k14 do

16:

test key (¯ k3, . . . , ¯ k14, ¯ k15) and stop if correct

17:

end for

18: end if

Yx: counter for x R(x): rank of x

The parameters are all optimized

slide-40
SLIDE 40

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP Challenges Tornado Attack on WEP

18

slide-41
SLIDE 41

Reminder on RC4

RC4

RC4/WEP Tornado Attack on WEP Challenges Challenges

18

slide-42
SLIDE 42

In our EUROCRYPT’11 Paper:

19

We made a heuristic assumption that V (Ygood) ⇥ V (Ybad). In practice: V (Ygood) ⇤= V (Ybad) We made a heuristic approximation that (Ygood Yi)’s are independent for all bad i’s. In practice: (Ygood Yi)’s are not independent. Assume the rank R of the correct counter to be normally distributed. In practice: R is not normally distributed. Assume R is following Poisson distribution. In practice E(R) ⇤= V (R).

slide-43
SLIDE 43

0.05 0.1 0.15 0.2 0.25 10 20 30 40 50 Probability R3 Realization Polya distribution with p = 0.9839 and r = 0.356 Experimental R3 distribution for 5000 packets

20

slide-44
SLIDE 44

George Pólya

(1887-1985)

Pr[ = ] = Γ( + ) !Γ() ( − )

  • 551. 578.7 : 551. 577.36 : 551. 501.45

(Advisory Committee on Weather Control, Washington D. C.)

The Frequency oI Hail Occurrence

By

  • H. C. S. Thorn

Summary. Hail occurrence, being a comparatively rare event, is fit well by the Poisson distribution providing the hail storms are independent. When this condition is not met, hail occurrence follows the negative binomial distri-

  • bution. A test is

given which determines whether the Poisson distribution may be used, or whether the negative binomial is necessary, The parameter of the Poisson distribution is always estimated efficiently by the method of moments. The parameters

  • f the negative binomial distribution, however,

are 0nly efficiently estimated by the method

  • f moments

under certain conditions; when the method of moments fails, the method of maximum likelihood must be employed. A criterion to determine when this method must be used is given together with the method

  • f obtaining the estimates. The methods

presented are illustrated by application to several hail records. Zusammeufassung. Unter der Voraussetzung, da[3 die Hagelfiille von- einander unabhiingig sind, kann das Auftreten dieses verh~Itnism~l~ig sel- tenen Ereignisses gut dutch eine Foissonsche Verteilung dargestellt werden; ist dies nicht der Fall, dann folgt es einer negativ binomischen Verteilung. Es wird clue Testmethode mitgeteilt, naeh welcher man entscheiden kann,

  • b die Poissonsehe oder die ncgativ binomische Verteilung zu verwenden

ist. Die [Parameter der Poissonschen Verteilung kSnnen mit der Methode der Momente immer zuverl~ssig bestimmt

  • werden. Die Parameter

der negativ bingmischen Verteilung j edoeh kSnnen mit dieser Methode nut unter bestimm- ten Umst~nden ermittelt werden. Falls die Methode der Momente versagt, ist die IViethode der grSl]tcn Wahrscheinlichkeit anzuwenden. Ein Kriterium zur Entscheidung, warm diese Methode angewendet werden muG, sowie eine Methode zur Ermittlung geniiherter Werte werden mitgeteilt. Die beschrie- benen statistischen Methoden werden durch Anwendung auf einige Hagel- beobaehtungsreihen erl~iutert. R6sum6. En adrnettant que les chutes de gr@le sont ind~pendantes les unes des autres, on peut eonvenablement repr6senter leur apparition par une distribution de frdquenees de Poisson. Si ee n'est pas le eas, ces chutes ob@issent une distribution bino.miale n@gative. L'auteur propose un test permettant

  • Arch. ~et. Geoph.
  • Biokl. ]3. Bd. 8, H. 2.

13

Rank of the correct counter follows the Pólya distribution. Pr[R = 0] = Pr[Ygood > Ybad(1), ... , Ygood > Ybad(255)]

slide-45
SLIDE 45

George Pólya

(1887-1985)

Pr[ = ] = Γ( + ) !Γ() ( − )

730

MONTHLY WEATHER REVIEW

OCTOBER-DECEMBER

1963

TORNADO PROBABILITIES

H.

  • C. S

. THOM

Office o

f Climatology, US.

Weather Bureau, Washington D.C. Manuscript received July 2

, 1963; revised August 7, 19631

ABSTRACT

The frequency distributions of tornado path width and length are developed using data series from Iowa and Kansas. Direction of path and annual frequency are discussed.

It is found that all but about 1 percent of Iowa tornadoes had path directions toward the northeast and southeast

  • quadrants. The annual frequency for a group of Iowa couiities is found to have a negative binomial distribution

indicating that the climatological series is formed from a Polya stochastic process. This resembles the situation for other types of storms where the events tend to cluster. A new map of annual frequency for the United States is presented for the period 1953-62, during which it is believed tornado observation was fairly stable. The expected value of tornado area is derived from the area distribution. From this and the annual frequency, the probability From these, the distribution of path area is derived.

  • f a tornado striking a point is found.
  • 1. INTRODUCTION

There have been a large number of studies of tornado climatology, most of which have been simply counts of tornadoes for various areas and time periods. Asp [I] lists 78 references, a few of which are not climatological in nature; not all references have been listed. Many of these studies have recognized the possible incompleteness

  • f the frequency series and the dif!iculties of observation,

but little could be done to correct this deficiency. So far

as is known, none of these studies made a direct attack

  • n the problem of tornado probability, which is the object
  • f the present, study.

In 1945, William F. Kuffel, then of the Dubuque Fire Marine Insurance Company, asked the writer to develop a system of limiting the loss from a single tornado in a given region for the purpose of preventing liabilities from exceeding reserve funds. This resulted in a limited study for several Iowa counties [a] in ivhich the direction fre- quency and path length and width distributions were

  • discussed. From this, a directed standard path was

devised within whose bounds the insured liability could be totaled. I

f this exceeded a certain limit related to

the reserves o f the company, the excess could be reinsured with other companies. It should be noted that the

  • ccurrence of more than one tornado in the region is still

to be taken care of by the ordinary risk of the business which is not well defined in this type of insurance coverage. By 1957, these ideas had developed further [3], and after mathematical distributions were fitted to the path length and width it was possible to determine the prob- ability of a tornado striking a point. There still remained a bothersome correlation between path length and width which was not easily taken into account in the area

  • distribution. This prevented obtaining a complete solu-

tion to the distribution problem. In 1958, Battan [4] presented a simple frequency diagram of path length, but his objective was to study the duration of a tornado, not its probability of occurrence. In the present study, we introduce distribution theory which provides a better fit to the basic data and makes possible a more satisfactory solution to the area distribu- tion problem. The distribution of annual frequency is also discussed and several comparisons of data are made, together with a number of statistical tests for homogeneity.

  • 2. PATH LENGTH AND WIDTH DISTRIBUTIONS

Since path width and length cannot be negative, zero must be the lower bound of any distribution assumed, although this need not be a greatest lower bound. As with a number of other physical variables, where the true bound is certainly near zero, but cannot be established

to be different from zero, it has proven convenient to

assume that the distribution has a zero lower bound. Also, in this instance, it would appear that both variables should have a probability density of zero at the origin, for as the path length and width approach their greatest lower bounds, the probability density should approach zero. In previous studies [3], a gamma distribution was as-

  • sumed. While it has a zero bound, it need not have a

zero probability density at the origin. When fitted to length and width data, both variables gave shape param- eter estimates which indicated non-zero densities at the

  • rigin. Furthermore, with this function the distribution
  • f area becomes intractable, and above all, the distribution

did not fit the data series particularly well.

Rank of the correct counter follows the Pólya distribution. Pr[R = 0] = Pr[Ygood > Ybad(1), ... , Ygood > Ybad(255)]

slide-46
SLIDE 46

George Pólya

(1887-1985)

Pr[ = ] = Γ( + ) !Γ() ( − )

“The annual frequency for a group

  • f Iowa counties is found to have

a negative binomial distribution indicating that the climatological series is formed from a Pólya stochastic process.”

Rank of the correct counter follows the Pólya distribution. Pr[R = 0] = Pr[Ygood > Ybad(1), ... , Ygood > Ybad(255)]

slide-47
SLIDE 47

IEEE 802.11 Data Frames: Active vs. Passive Attacks

22

ARP Packet 0xAA DSAP 0xAA SSAP 0x03 CTRL 0x00 0x00 ORG Code 0x00 0x08 ARP 0x06 0x00 Ethernet 0x01 0x08 IP 0x00 0x06 Hardware size 0x04 Protocol 0x00 Opcode Request/Reply 0x?? 0x?? MAC addr src 0x?? 0x?? 0x?? 0x?? 0x?? 0x?? IP src 0x?? 0x?? 0x?? 0x?? MAC addr dst 0x?? 0x?? 0x?? 0x?? 0x?? TCP/IPv4 Packet 0xAA DSAP 0xAA SSAP 0x03 CTRL 0x00 0x00 ORG Code 0x00 0x08 IP 0x00 0x45 IP Version + Header length 0x00 Type of Service 0x?? Packet length 0x?? 0x?? IP ID RFC815 0x?? 0x40 Fragment type and offset 0x?? 0x?? TTL 0x06 TCP type 0x?? Header checksum 0x?? 0x?? IP src 0x?? 0x?? 0x?? 0x?? IP dst 0x?? 0x?? 0x?? 0x?? Port src 0x?? 0x?? Port dst 0x??

slide-48
SLIDE 48

Comparison with Aircrack-ng

23

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 10000 15000 20000 25000 30000 35000 40000 45000 50000 Success Probability Number of Packets Aircrack-ng-Patched Active Aircrack-ng-Original Active Aircrack-ng-Patched Passive

slide-49
SLIDE 49

24

Conclusion

slide-50
SLIDE 50

24

Conclusion

Providing the fastest attack on WEP to the date Good understanding of the behaviour of all biases in WEP All the theory behind WEP attack with a proof A better understanding of WPA security Necessity of practical evaluation to ensure the correctness of theory

slide-51
SLIDE 51

Questions?