Tews らによるWEPに対する鍵回復攻撃に関する考察 A Study on the Tews-Weinmann-Pyshkin Attack against WEP

Search this Article

Author(s)

Abstract

2007年,TewsらはKleinによるWEPに対する鍵回復攻撃を最適化した手法を提案し,40,000パケットの観測によって50%, 85,000パケットの観測によって95%の秘密鍵復元を可能とした.本稿では,Tewsらの攻撃を考察し,より少ないパケットの観測によって効率よく秘密鍵の情報を得られる手法を提案する.

Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of Klein's key recovery attack against RC4. The TWP attack allows an attacker to recover a 104-bit secret key from 40,000 captured packets with probability 0.5 and from 85,000 captured packets with probability 0.95. In this paper, we improve the probability of recovering the key when the number of captured packets is less, efficiently. For example, if 10,000 packets are captured, then the probability of recovering it is three times as large as than that of the TWP attack. If 20,000 packets are done, then it is twice as large as than that of the TWP attack. Our attack can find the secret key in a few seconds.

Journal

  • IPSJ SIG Notes

    IPSJ SIG Notes 38, 225-229, 2007-07-19

    Information Processing Society of Japan (IPSJ)

References:  6

Codes

  • NII Article ID (NAID)
    110006379956
  • NII NACSIS-CAT ID (NCID)
    AA11235941
  • Text Lang
    ENG
  • Article Type
    ART
  • ISSN
    09196072
  • NDL Article ID
    8857267
  • NDL Call No.
    Z14-1121
  • Data Source
    CJP  NDL  NII-ELS 
Page Top