An Implementation and Evaluation for a Message Falsification Attack on WPA

Bibliographic Information

Other Title
  • 無線LAN暗号化WPAへの改ざん攻撃の実装と評価(ライフログ活用技術,オフィス情報システム,マルチメディアシステム,マルチメディア通信,IP放送/映像伝送,一般)
  • 無線LAN暗号化WPAへの改ざん攻撃の実装と評価
  • ムセン LAN アンゴウカ WPA エ ノ カイザンコウゲキ ノ ジッソウ ト ヒョウカ

Search this article

Abstract

In November 2008, Beck and Tews have proposed a message falsification attack on WPA-TKIP. Their attack (called the Beck-Tews attack) works for only wireless LAN products that support IEEE802.11e QoS features. The Beck-Tews attack can recover a MIC key and falsify an encrypted short packet (for example, an ARP packet and a DNS packet) with 12-15 minutes. In JWIS2009, Ohigashi and Morii have proposed a new message falsification attack based on the man-in-the-middle attack. This attack can work for any WPA implementations, and uses three kinds of attack modes. Additionally, they reduce the execution time of the attack to about 1 minute in the message falsification mode, which is a mode for falsifying a message using an MIC key obtained by other attack mode. However, the execution time written in JWIS2009 has been obtained from the rough theoretical estimation. In this paper, we evaluate the execution time of the attack of JWIS2009 by the experiment in a realistic environment. As a result, we demonstrate that the average execution time of the attack of JWIS2009 is about 10 seconds in the message falsification mode.

Journal

  • ITE Technical Report

    ITE Technical Report 33.37 (0), 113-118, 2009

    The Institute of Image Information and Television Engineers

Citations (2)*help

See more

References(44)*help

See more

Details 詳細情報について

Report a problem

Back to top