Weaknesses in the temporal key hash of WPA
- 1 April 2004
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGMOBILE Mobile Computing and Communications Review
- Vol. 8 (2) , 76-83
- https://doi.org/10.1145/997122.997132
Abstract
This article describes some weaknesses in the key scheduling in Wi-Fi Protected Access (WPA) put forward to secure the IEEE standard 802.11-1999. Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key. This is not a practical attack on WPA, but it shows that parts of WPA are weak on their own. Using this attack it is possible to do a TK recovery attack on WPA with complexity O (2 105 ) compared to a brute force attack with complexity O (2 128 ).Keywords
This publication has 1 reference indexed in Scilit:
- Intercepting mobile communicationsPublished by Association for Computing Machinery (ACM) ,2001