[12041] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Possible fixes for 802.11 WPA message authentication

daemon@ATHENA.MIT.EDU (Niels Ferguson)
Mon Nov 11 22:20:01 2002

Date: Mon, 11 Nov 2002 23:46:46 +0100
To: "Arnold G. Reinhold" <reinhold@world.std.com>,
	cryptography@wasabisystems.com
From: Niels Ferguson <niels@ferguson.net>
In-Reply-To: <v04210102b9f58605baec@[192.168.0.2]>

At 12:06 11/11/02 -0500, Arnold G. Reinhold wrote:
[...]
>1. Shuffle the order of the message words stirred into Michael.  For 
[...]

I can't go into details here due to NDA considerations, but this idea
cannot be efficiently implemented on some of the existing hardware.


>2. Refresh the Michael key frequently. This proposal rests on WPA's 
[...]

This has no effect on the best attack we have so far. The attack is a
differential attack, and changing the key doesn't change the probabilities.


>3.  Do MIC chaining.  Xor (or add) the MIC output block from the 
>previous packet to K (or to the previous sub-key) to form the Michael 
>sub-key for the current packet. This costs very little and makes it 
>much more difficult to figure out K without breaking the WPA 
>encryption.

Just like idea 2, this doesn't affect the best known attack as that attack
never tries to recover the Michael key.

Cheers!

Niels
==============================================================
Niels Ferguson, niels@ferguson.net, phone: +31 20 463 0977
PGP: 3EC2 3304 9B6E 27D9  72E7 E545 C1E0 5D7E

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post