Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol

Authors: M. Junaid , Muid Mufti, M. Umar Ilyas

Abstract:

IEEE has recently incorporated CCMP protocol to provide robust security to IEEE 802.11 wireless LANs. It is found that CCMP has been designed with a weak nonce construction and transmission mechanism, which leads to the exposure of initial counter value. This weak construction of nonce renders the protocol vulnerable to attacks by intruders. This paper presents how the initial counter can be pre-computed by the intruder. This vulnerability of counter block value leads to pre-computation attack on the counter mode encryption of CCMP. The failure of the counter mode will result in the collapse of the whole security mechanism of 802.11 WLAN.

Keywords: Information Security, Cryptography, IEEE 802.11i, Computer security, Wireless LAN

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1333294

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2635

References:


[1] Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.11i-2004, Amendment to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements", July, 2004.
[2] Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.1X- 2001, "IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control" June, 2001.
[3] Specification for the Advanced Encryption Standard (AES), FIPS 197, U.S. National Institute of Standards and Technology. November 26, 2001. (Online) Available: http://www.nist.gov/aes
[4] D. Whiting, R. Housley, and N. Ferguson. "Counter with CBC-MAC (CCM)". RFC 3610, September 2003.
[5] NIST Special Publication 800-38C, "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality". May 2004. (Online) Available: http://csrc.nist.gov/publications/
[6] David A. McGrew, "Counter Mode Security: Analysis and Recommendations", Cisco Systems, November, 2002.
[7] M.E. Hellman, "A cryptanalytic time-memory trade-off", IEEE Transactions on Information Theory, July, 1980, pp. 401-406.
[8] D. A. McGrew and S. R. Fluhrer, "Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security", The Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptography (SAC 2000), Springer-Verlag, August, 2000. (Online) Available: http://www.mindspring.com/~dmcgrew/dam-srf-sac00.pdf
[9] A. Biryukov, A. Shamir, D. Wagner , "Real Time Cryptanalysis of A5/1 on a PC", Proceedings of the Fast Software Encryption Workshop 2000, Springer-Verlag, Lecture Notes in Computer Science, 2000.
[10] Jin Hong, Palash Sarkar, "Rediscovery of Time Memory Tradeoffs", 2005. (Online) Available: http://cr.yp.to/2005-590/hong.pdf
[11] M. Blaze, W. Die, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Weiner, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security", January 1996. (Online) Available: http://www.counterpane.com/keylength.html
[12] Moore-s law (Online) Available: http://www.Webopedia.com/TERM/M/Moores_Law.html