the final nail in wep s coffin
play

The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua - PowerPoint PPT Presentation

Introduction Fragmentation Attack Implementation Conclusion 1/19 The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy Introduction


  1. Introduction Fragmentation Attack Implementation Conclusion 1/19 The Final Nail in WEP’s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft.

  2. Wired Equivalent Privacy Introduction Fragmentation Attack Implementation Conclusion 2/19 WEP is the 802.11 standard for encryption. Pre-shared key for whole network. Protects data privacy since data is encrypted. Access control: need key to transmit. In practice, only half of the networks are encrypted. In the subset of encrypted networks, WEP is most adopted. Popularity (%) of WEP and its alternatives based on our survey Region WEP WPA 802.11i London 76 20 4 Seattle region 85 14 1

  3. Goals when attacking WEP Introduction Fragmentation Attack Implementation Conclusion 3/19 Decrypt data in packets. Obtain access to the network by being able to transmit data. Recover the WEP key.

  4. Contribution Introduction Fragmentation Attack Implementation Conclusion 4/19 Today, millions of packets are required to break a WEP key. Our fragmentation attack allows: 1 Transmitting arbitrary data after eavesdropping a single data packet on an 802.11 WEP protected network. 2 Real-time decryption given that network is connected to Internet.

  5. Outline Introduction Fragmentation Attack Implementation Conclusion 5/19 Introduction 1 WEP Description WEP Attacks Fragmentation Attack 2 Transmission Decryption Implementation 3 Performance Evaluation Conclusion 4

  6. WEP operation Introduction Fragmentation Attack Implementation Conclusion 6/19 Data frame format Frame Body 802.11 Header CRC IV User Data ICV { { Initialization Vector CRC32 of user data Encryption keystream { IV + key RC4 0 1 0 1 { ⊕ seed Plain text 1 1 0 0 = 1 0 0 1 Cipher text

  7. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  8. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  9. History of WEP attacks Introduction Fragmentation Attack Implementation . . . and how the real problem was ignored Conclusion 7/19 Year 2000. Keystream attacks (independent of WEP key): Design flaw: WEP allows keystream reuse. Attacks were thought impractical: Need plain-text to recover keystream. Need 2 24 keystreams to decrypt all possible packets. Year 2001. Weak IV attacks (recover WEP key): Need millions of packets. Could take hours, and usually, days. Use EAP-based solutions to re-key, say, every ten minutes. Year 2006. Our contribution: fragmentation attack. Keystream attack which may be performed within minutes.

  10. Fragmentation attack Introduction Fragmentation Attack Implementation Outline Conclusion 8/19 Transmission 1 Recover a keystream. 2 Reuse the keystream to send arbitrary data. ❍❍❍❍❍❍❍❍ � � � ✠ ❥ Keystream-based decryption WEP key recovery Resend data through the AP to a Use transmission ability for buddy on the Internet. speeding up weak IV Recover the keystream used for attacks. encrypting the packet.

  11. Transmission Introduction Fragmentation Attack Implementation Recovering a short keystream Conclusion 9/19 If cipher-text & plain-text pair is known, their XOR is a keystream. Known plain-text (LLC/SNAP headers) in IP packets: 802.11 header 0xAA 0xAA 0x03 0x00 0x00 0x00 0x08 0x00

  12. Transmission Introduction Fragmentation Attack Implementation Recovering a short keystream Conclusion 9/19 If cipher-text & plain-text pair is known, their XOR is a keystream. Known plain-text (LLC/SNAP headers) in IP packets: 802.11 header 0xAA 0xAA 0x03 0x00 0x00 0x00 0x08 0x00 ⊕ Cipher-text 802.11 header = 8 bytes of keystream Can recover 8 bytes of keystream by eavesdropping a packet. Can encrypt (and transmit) 8 bytes of arbitrary data.

  13. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  14. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  15. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  16. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  17. Transmission Introduction Fragmentation Attack Implementation Sending arbitrarily long data Conclusion 10/19 802.11 supports MAC layer fragmentation. Transmit arbitrary data in 8 byte chunks. Fragmentation Data CRC32 } } Original plain-text & CRC. abcd efgh 1234 Fragments & CRC. efgh abcd 1983 1914 ⊕ ⊕ Keystream (IV x ). 1234 5678 1234 5678 = IV = } Encrypted frags. 2911 8305 1337 6667 x x

  18. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  19. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  20. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

  21. Transmission Introduction Fragmentation Attack Implementation Recovering a longer keystream Conclusion 11/19 Discover a longer keystream to avoid sending many tiny packets: Send a long broadcast frame via multiple smaller fragments. AP relays it as a single packet. (New cipher & plain-text pair.) Keystream discovery IV Data CRC } } } Encrypted frags. 2911 8305 1337 6667 x x De-crypt & reassemble. abcd efgh 1234 Calculate entire CRC. ⊕ Keystream for IV y . 3141 5926 5358 = Relayed payload. y 2718 2818 2845

Recommend


More recommend