Authors | V. Moen, H. Raddum and K. J. Hole |
Title | Weaknesses in the temporal key hash of WPA |
Afilliation | , Communication Systems |
Project(s) | Simula UiB |
Status | Published |
Publication Type | Journal Article |
Year of Publication | 2004 |
Journal | Mobile Computing and Communications Review |
Volume | 8 |
Issue | 2 |
Pagination | 76-83 |
Date Published | 04/2004 |
Publisher | ACM Sigmobile |
Keywords | 802.11, MIC, Michael, temporal key hash, TKIP, WPA |
Abstract | This article describes some weaknesses in the key scheduling in Wi-Fi Protected Access (WPA) put forward to secure the IEEE standard 802.11-1999. Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key. This is not a practical attack on WPA, but it shows that parts of WPA are weak on their own. Using this attack it is possible to do a TK recovery attack on WPA with complexity O(2105) compared to a brute force attack with complexity O (2128). |
DOI | 10.1145/997122.997132 |
Citation Key | 24078 |