wep weak ivs revisited
play

WEP Weak IVs Revisited Kazukuni Kobara and Hideki Imai IIS, Univ. - PowerPoint PPT Presentation

WEP Weak IVs Revisited Kazukuni Kobara and Hideki Imai IIS, Univ. of Tokyo RCIS, AIST 1 Outline Available options for securing WLAN access WEP and its key recovery attack Condition to recover the WEP key Good and bad strategies


  1. WEP Weak IVs Revisited Kazukuni Kobara and Hideki Imai IIS, Univ. of Tokyo RCIS, AIST 1

  2. Outline � Available options for securing WLAN access � WEP and its key recovery attack � Condition to recover the WEP key � Good and bad strategies to trace the condition back to the patterns of IVs and WEP keys � Conclusion 2

  3. Available Options for Securing WLAN Access � Channel Protection (& � (Authentication &) Authentication) Key-Establishment � AES-CCM � EAP-TLS � TKIP � EAP-TTLS, PEAP � (Weak-IV skipping WEP) � EAP-MD5, LEAP � WEP � PSK � Filtering � Filtering with MAC address 3

  4. Disadvantage: • Old WLAN cards and APs cannot support them Current Status Fully investigated and � AES-CCM no serious attack has � TKIP been identified � (Weak-IV skipping) WEP Not fully investigated � (Conventional) WEP Insecure even � Filtering with MAC against casual address attacks Advantage: • Compatible with WEP • Old WLAN cards and APs may support easily 4

  5. WEP: Wired Equivalent Privacy � A specification for securing wireless access, especially of 802.11 Note: WEP (as well as TKIP and AES-CCM) give protection only for wireless part, but not for the wired part. 5

  6. History of battles over WEP This work: reviews the attacks and identifies more advanced patterns of IVs and WEP keys to skip Cracking tools are 2001~ : Some chip 2001~ : New being improved specs, TKIP makers started and AES ( Not Keys can be skipping certain IVs, interoperable recovered but this is still 2001: The key with WEP ) incomplete recovery attack was identified by FMS, and then 1999: WEP was implemented standardized Attack Prevention 6

  7. WEP : Wired Equivalent Privacy mobile node access point IV, (m||CRC(m))+ RC4(IV||K ’ ) Pre-Shared Key: K ’ Pre-Shared Key: K ’ IV: Initial Value m: message + : exclusive-or ||: concatenation 7

  8. WEP : Wired Equivalent Privacy mobile node access point IV, (m||CRC(m))+ RC4(IV||K ’ ) Integrity check Encryption with RC4 key stream + : exclusive-or 8

  9. RC4 Stream Cipher key key stream (pseudo random sequence) (seed) K RC4(K) 011010010111 c m ciphertext message 9

  10. KSA: Key Scheduling Algorithm PRGA: Pseudo Random Generator Algorithm RC4 for n= 8 256 byte buffer key 0 1 2 3 4 5 255 (seed) KSA K shuffles it byte wise according to the key 141 5 21 1 255 124 3 PRGA outputs key stream while swapping the buffer key stream 203 32 121 (pseudo random sequence) 10

  11. 11 KSA

  12. 12 PRGA

  13. IV key 5 254 250 255 K[4] K[l-1] KSA K[] j i = j i-1 + S i [i]+ K[i mod l] i j= 0 i= 0 0 1 2 3 4 5 255 j= 5 swap i= 1 5 1 2 3 4 0 255 j= 4 swap i= 2 5 4 2 3 1 0 255 j= 255 swap i= 3 j= 0 5 4 255 3 1 0 2 swap 13 shuffled buffer

  14. PRGA j i = j i-1 + S i [i] S i [i]+ S i [j i ] i j= 0 i= 1 5 4 1 255 251 0 2 j= 4 2 swap 5 251 1 255 4 0 2 i= 2 j= 5 251 swap i= 3 j= 4 5 251 0 255 4 1 2 swap 255 output sequence 14

  15. Gap between WEP and others WEP WEP known unknown [FMS01][SIR01] Key is recoverable IV, RC4( IV || key ) While the gap might be small, it made a big difference!! SSL/TLS etc SSL/TLS etc unknown key is not recoverable RC4( key ) 15

  16. Idea of Key Recovery Attack WEP WEP RC4 output bytes first second third byte byte byte WeakIV, RC4( WeakIV || key ) 203 32 121 For certain IVs called “ Weak IVs ” the correlation between the first output byte and one byte of the key becomes higher than the average 1/256= 0.004. Typical prob. is 0.05 16

  17. The famous weak IVs identified by FMS IV WEP key t 255 * K[3] K[4] K[15] t= 3 to 15 t: target key byte to crack 17

  18. Notations Known byte Known and untouchable byte (should not be referred to by index j i for i > t ’ ) Target byte (which depends on K[t] and should not be referred to by j i for i > t ’ except i= t) Unknown byte t ’ : (# of known bytes in K[])-1 18

  19. IV WEP key 3 255 * K[3] K[4] K[] t= 3 i= 0 0 1 2 3 4 5 255 i= 1 3 1 2 0 4 5 255 3 0 2 1 4 5 255 i= 2 KSA depends on K[3] 3 0 255 1 4 5 2 i= 3 3 0 5 i= 4 i= 5 3 0 5 3 0 5 i= 255 j= s[1] i= 1 Pr= (1-2/256)x PRGA (1-3/256) (256-4) i= 1 3 0 5 = 0.05 19 S[1] S[S[1]]

  20. Relationship Among Weak IVs Some of the Current WEP Famous current chips cracking tools Convert the condition weak IVs skip a little collect more into the patterns of IVs wider area wide area using and WEP keys so that general the more advanced condition patterns to skip can be (IV[0],IV[1],IV[2]) identified. = (t,255,* ) This work 0 ≦ S[1] ≦ t ’ and S[1]+ S[S[1]]= t (IV[0],IV[1],IV[2])= ? 20

  21. Note (K[0], K[1], K[2])= (IV[0], IV[1], IV[2]) The difficult part � S[] depends not only on IVs, but also on WEP keys, K[3] to K[t ’ ] � i.e. by exhaustive searching K[3] to K[t ’ ], a lot of key-dependent weak IVs are available � (and skipping key-dependent weak IVs only is not enough!!) � Listing up all the combinations of IVs and WEP keys with exhaustive search is computationally infeasible 21

  22. Another Naive Approach � Skip IVs meeting the condition but only for the currently set WEP key � This is feasible, but � This causes another vulnerability � the information on the WEP key is revealed from the skipped patterns � since most of the weak IVs depend on the WEP key 22

  23. We took the approach � to trace the condition back to the patterns of IVs and WEP keys theoretically � We are now summarizing the results and will open them soon 23

  24. Our Contribution Security level More advanced versions of Secure against weak-IV-skipping WEP WEP cracking tools This work Current versions of Insecure weak-IV-skipping WEP against WEP cracking tools Original WEP (no IV skip) 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend