Temporal Key Integrity Protocol: Difference between revisions
121.98.134.87 (talk) |
L33th4x0rguy (talk | contribs) Clairify, add link, and add information on TKIP attack |
||
Line 18: | Line 18: | ||
==Security== |
==Security== |
||
TKIP is vulnerable to a keystream recovery attack that, if successfully executed, permits an attacker to transmit 7-15 packets of the attacker's choice on the network. The current publicly available TKIP-specific attacks do not reveal the Pairwise Master Key or the Pairwise Temporal Keys. On November 8, 2008, Martin Beck and Erik Tews released a paper detailing this attack method.<ref>Martin Beck & Erik Tews, Practical attacks against WEP and WPA", available at [http://dl.aircrack-ng.org/breakingwepandwpa.pdf].</ref> |
|||
On November 6, 2008, stories started coming out that WPA/TKIP has been cracked |
|||
<ref name=TKIP_cracking_software>{{cite web |url=http://www.aircrack-ng.org/doku.php?id=tkiptun-ng |date=[[2008-11-06]] |accessdate=2008-11-11| title=Tkiptun-ng}}</ref> |
|||
The attack is an extension of the [[Wired Equivalent Privacy|WEP]] chop-chop attack. Because WEP utilizes a cryptographically insecure checksum mechanism ([[CRC32]]), an attacker can guess individual bytes of a packet, and the wireless access point will confirm or deny whether or not the guess is correct. If the guess is correct, the attacker will be able to detect the guess is correct and continue to guess other bytes of the packet. However, unlike the chop-chop attack against a WEP network, the attacker must wait for at least 60 seconds after a correct guess (a successful circumvention of the CRC32 mechanism) before continuing the attack. This is because although TKIP continues to use the CRC32 checksum mechanism, it implements an additional MIC code named Michael (see above). If two incorrect Michael MIC codes are received within 60 seconds, the access point will implement countermeasures, meaning it will rekey the TKIP session key, thus changing future keystreams. Accordingly, the Beck-Tews TKIP attack will wait an appropriate amount of time in order to avoid these countermeasures. Because [[address resolution protocol|ARP]] packets are easily identified by their size, and the vast majority of the contents of this packet would be known to an attacker, the number of bytes an attacker must guess using the above method is rather small (approximately 14 bytes). Beck and Tews estimate recovery of 12 bytes is possible in about 12 minutes on a typical network. |
|||
An attacker already has access to the entire ciphertext packet. Upon retrieving the entire plaintext of the same packet, the attacker has access to the keystream of the packet, as well as the MIC code of the session. Using this information the attacker can construct a new packet and transmit it on the network. In order to circumvent the WPA implemented replay protection, the Beck-Tews attack utilizes [[Quality of service|QoS]] channels in order to transmit these newly constructed packets. An attacker able to transmit these packets may be able to implement any number of attacks, including [[apr poisoning]] attacks, denial of service, and other similar attacks. |
|||
==References== |
==References== |
Revision as of 05:09, 11 November 2008
Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networks.
Background
TKIP (pronounced "tee-kip") was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable link-layer security, and a solution was required for already deployed hardware.
On October 31 2002, the Wi-Fi Alliance endorsed TKIP under the name Wi-Fi Protected Access (WPA).[1] The IEEE endorsed the final version of TKIP, along with more robust solutions such as 802.1X and the AES based CCMP, when they published IEEE 802.11i-2004 on 23 July 2004.[2] The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name WPA2.Cite error: The <ref>
tag has too many names (see the help page).
Technical details
TKIP is a wrapper that goes around the existing WEP encryption. TKIP comprises the same encryption engine and RC4 algorithm defined for WEP. However, the key used for encryption in TKIP is 128 bits long. This solves the first problem of WEP: the key length is too short.
An important part of TKIP is that it changes the key used for each packet. This is the 'Temporal' part of the picture. The key is created by mixing together a combination of things, including a base key (called a Pairwise Transient Key in TKIP parlance), the MAC address of the transmitting station, and the serial number for the packet. The mixing operation is designed to put a minimum demand on the stations and access points, yet have enough cryptographic strength so that it cannot easily be broken.
Each packet transmitted using TKIP has a unique 48-bit serial number that is incremented every time a new packet is transmitted and used both as the Initialization Vector and part of the key. Putting a sequence number into the key ensures that the key is different for every packet. This solves another problem of WEP, called 'collision attacks', which can occur when the same key is used for two different packets. With different keys, there are no collisions.
Having the serial number of the packet also be the initialization vector helps to reduce yet another WEP problem, called "replay attacks." Because a 48-bit sequence number will take thousands of years to repeat itself, no one can replay old packets from a wireless connection—they will be detected as out of order because the sequence numbers won't be right.
The last, and most important, piece that is mixed into the TKIP key is the base key. Without a way to generate unique base keys, TKIP would solve many of WEP's problems, but not its worst one: the constant reuse of a well-known key by everyone on the wireless LAN. To deal with this, TKIP generates the base key that is mixed into the per-packet key. Each time a wireless station associates to an access point, a new base key is created. This base key is built by hashing together a special session secret with some random numbers (called nonces) generated by the access point and the station as well as the MAC address of the access point and the station. With IEEE 802.1X authentication, the session secret is unique and transmitted securely to the station by the authentication server; when using TKIP with pre-shared keys, the session secret is the same for everyone and never changes—hence the vulnerability of using TKIP with pre-shared keys.
Security
TKIP is vulnerable to a keystream recovery attack that, if successfully executed, permits an attacker to transmit 7-15 packets of the attacker's choice on the network. The current publicly available TKIP-specific attacks do not reveal the Pairwise Master Key or the Pairwise Temporal Keys. On November 8, 2008, Martin Beck and Erik Tews released a paper detailing this attack method.[3]
The attack is an extension of the WEP chop-chop attack. Because WEP utilizes a cryptographically insecure checksum mechanism (CRC32), an attacker can guess individual bytes of a packet, and the wireless access point will confirm or deny whether or not the guess is correct. If the guess is correct, the attacker will be able to detect the guess is correct and continue to guess other bytes of the packet. However, unlike the chop-chop attack against a WEP network, the attacker must wait for at least 60 seconds after a correct guess (a successful circumvention of the CRC32 mechanism) before continuing the attack. This is because although TKIP continues to use the CRC32 checksum mechanism, it implements an additional MIC code named Michael (see above). If two incorrect Michael MIC codes are received within 60 seconds, the access point will implement countermeasures, meaning it will rekey the TKIP session key, thus changing future keystreams. Accordingly, the Beck-Tews TKIP attack will wait an appropriate amount of time in order to avoid these countermeasures. Because ARP packets are easily identified by their size, and the vast majority of the contents of this packet would be known to an attacker, the number of bytes an attacker must guess using the above method is rather small (approximately 14 bytes). Beck and Tews estimate recovery of 12 bytes is possible in about 12 minutes on a typical network.
An attacker already has access to the entire ciphertext packet. Upon retrieving the entire plaintext of the same packet, the attacker has access to the keystream of the packet, as well as the MIC code of the session. Using this information the attacker can construct a new packet and transmit it on the network. In order to circumvent the WPA implemented replay protection, the Beck-Tews attack utilizes QoS channels in order to transmit these newly constructed packets. An attacker able to transmit these packets may be able to implement any number of attacks, including apr poisoning attacks, denial of service, and other similar attacks.
References
- ^ "Wi-Fi Alliance Announces Standards-Based Security Solution to Replace WEP". Wi-Fi Alliance. 2002-10-31. Retrieved 2007-12-21.
{{cite web}}
: Check date values in:|date=
(help) - ^ "IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements" (pdf). IEEE Standards. 2004-07-23. Retrieved 2007-12-21.
{{cite web}}
: Check date values in:|date=
(help) - ^ Martin Beck & Erik Tews, Practical attacks against WEP and WPA", available at [1].