the final nail in wep s coffin
play

The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua - PowerPoint PPT Presentation

Introduction Fragmentation Attack Implementation Conclusion 1/19 The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy Introduction


  1. Introduction Fragmentation Attack Implementation Conclusion 1/19 The Final Nail in WEP’s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft.

  2. Wired Equivalent Privacy Introduction Fragmentation Attack Implementation Conclusion 2/19 WEP is the 802.11 standard for encryption. Pre-shared key for whole network. Protects data privacy since data is encrypted. Access control: need key to transmit. In practice, only half of the networks are encrypted. In the subset of encrypted networks, WEP is most adopted. Popularity (%) of WEP and its alternatives based on our survey Region WEP WPA 802.11i London 76 20 4 Seattle region 85 14 1

  3. Goals when attacking WEP Introduction Fragmentation Attack Implementation Conclusion 3/19 Decrypt data in packets. Obtain access to the network by being able to transmit data. Recover the WEP key.

  4. Contribution Introduction Fragmentation Attack Implementation Conclusion 4/19 Today, millions of packets are required to break a WEP key. Our fragmentation attack allows: 1 Transmitting arbitrary data after eavesdropping a single data packet on an 802.11 WEP protected network. 2 Real-time decryption given that network is connected to Internet.

  5. Outline Introduction Fragmentation Attack Implementation Conclusion 5/19 Introduction 1 WEP Description WEP Attacks Fragmentation Attack 2 Transmission Decryption Implementation 3 Performance Evaluation Conclusion 4

  6. WEP operation Introduction Fragmentation Attack Implementation Conclusion 6/19 Data frame format Frame Body 802.11 Header CRC IV User Data ICV { { Initialization Vector CRC32 of user data Encryption keystream { IV + key RC4 0 1 0 1 { ⊕ seed Plain text 1 1 0 0 = 1 0 0 1 Cipher text

  7. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  8. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  9. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  10. Fragmentation attack Introduction Fragmentation Attack Implementation Outline Conclusion 8/19 Transmission 1 Recover a keystream. 2 Reuse the keystream to send arbitrary data. ❍❍❍❍❍❍❍❍ � � � ✠ ❥ Keystream-based decryption WEP key recovery Resend data through the AP to a Use transmission ability for buddy on the Internet. speeding up weak IV Recover the keystream used for attacks. encrypting the packet.

  11. Transmission Introduction Fragmentation Attack Implementation Recovering a short keystream Conclusion 9/19 If cipher-text & plain-text pair is known, their XOR is a keystream. Known plain-text (LLC/SNAP headers) in IP packets: 802.11 header 0xAA 0xAA 0x03 0x00 0x00 0x00 0x08 0x00

  12. Transmission Introduction Fragmentation Attack Implementation Recovering a short keystream Conclusion 9/19 If cipher-text & plain-text pair is known, their XOR is a keystream. Known plain-text (LLC/SNAP headers) in IP packets: 802.11 header 0xAA 0xAA 0x03 0x00 0x00 0x00 0x08 0x00 ⊕ Cipher-text 802.11 header = 8 bytes of keystream Can recover 8 bytes of keystream by eavesdropping a packet. Can encrypt (and transmit) 8 bytes of arbitrary data.

  13. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  14. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  15. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  16. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  17. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  18. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  19. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  20. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  21. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend