Speedway

Temporal Key Integrity Protocol: Difference between revisions

Content deleted Content added
Undid revision 353084743 by 208.76.2.197 (talk) - MOS:CAPS
Frysalebald (talk | contribs)
m integrate into introduction
Line 1: Line 1:
'''Temporal Key Integrity Protocol''' or '''TKIP''' is a [[security protocol]] used in the [[IEEE 802.11]] wireless networking standard.
'''Temporal Key Integrity Protocol''' or '''TKIP''' (pronounced {{IPA|/ˌtiːˈkɪp/}}, "tee-kip") is a [[security protocol]] used in the [[IEEE 802.11]] wireless networking standard. TKIP was designed by the [[IEEE 802.11i]] task group and the [[Wi-Fi Alliance]] as a solution to replace [[Wired_Equivalent_Privacy|WEP]] without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable [[Data link layer#Logical Link Control Sublayer|link-layer]] security, and a solution was required for already deployed hardware.


== Background ==
== Background ==
TKIP (pronounced {{IPA|/ˌtiːˈkɪp/}}, "tee-kip") was designed by the [[IEEE 802.11i]] task group and the [[Wi-Fi Alliance]] as a solution to replace [[Wired_Equivalent_Privacy|WEP]] without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable [[Data link layer#Logical Link Control Sublayer|link-layer]] security, and a solution was required for already deployed hardware.

On October 31, 2002, the Wi-Fi Alliance endorsed TKIP under the name [[Wi-Fi Protected Access|Wi-Fi Protected Access (WPA)]].<ref name=WPA_announcement>{{cite web |url=http://wi-fi.org/pressroom_overview.php?newsid=55 |date=2002-10-31 |accessdate=2007-12-21| work=[[Wi-Fi Alliance]]| title=Wi-Fi Alliance Announces Standards-Based Security Solution to Replace WEP}}</ref> The IEEE endorsed the final version of TKIP, along with more robust solutions such as [[802.1X]] and the [[Advanced Encryption Standard|AES]] based [[CCMP]], when they published IEEE 802.11i-2004 on 23 July 2004.<ref name=80211i>{{cite web|url=http://standards.ieee.org/getieee802/download/802.11i-2004.pdf |format=pdf |title=IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements |date=2004-07-23 |publisher=[[IEEE Standards]] |accessdate=2007-12-21}}</ref> The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name [[WPA2]].<ref name WPA2_announcement>{{cite web |url=http://wi-fi.org/pressroom_overview.php?newsid=31 |date=2004-09-01 |accessdate=2007-12-21| work=[[Wi-Fi Alliance]]| title=Wi-Fi Alliance Introduces Next Generation of Wi-Fi Security}}</ref>
On October 31, 2002, the Wi-Fi Alliance endorsed TKIP under the name [[Wi-Fi Protected Access|Wi-Fi Protected Access (WPA)]].<ref name=WPA_announcement>{{cite web |url=http://wi-fi.org/pressroom_overview.php?newsid=55 |date=2002-10-31 |accessdate=2007-12-21| work=[[Wi-Fi Alliance]]| title=Wi-Fi Alliance Announces Standards-Based Security Solution to Replace WEP}}</ref> The IEEE endorsed the final version of TKIP, along with more robust solutions such as [[802.1X]] and the [[Advanced Encryption Standard|AES]] based [[CCMP]], when they published IEEE 802.11i-2004 on 23 July 2004.<ref name=80211i>{{cite web|url=http://standards.ieee.org/getieee802/download/802.11i-2004.pdf |format=pdf |title=IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements |date=2004-07-23 |publisher=[[IEEE Standards]] |accessdate=2007-12-21}}</ref> The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name [[WPA2]].<ref name WPA2_announcement>{{cite web |url=http://wi-fi.org/pressroom_overview.php?newsid=31 |date=2004-09-01 |accessdate=2007-12-21| work=[[Wi-Fi Alliance]]| title=Wi-Fi Alliance Introduces Next Generation of Wi-Fi Security}}</ref>



Revision as of 22:30, 13 April 2010

Temporal Key Integrity Protocol or TKIP (pronounced /ˌtiːˈkɪp/, "tee-kip") is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable link-layer security, and a solution was required for already deployed hardware.

Background

On October 31, 2002, the Wi-Fi Alliance endorsed TKIP under the name Wi-Fi Protected Access (WPA).[1] The IEEE endorsed the final version of TKIP, along with more robust solutions such as 802.1X and the AES based CCMP, when they published IEEE 802.11i-2004 on 23 July 2004.[2] The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name WPA2.Cite error: The <ref> tag has too many names (see the help page).

TKIP has reached the end of its designed lifetime and has been deprecated in the next[needs update] full release of the 802.11 standard.[3]

Technical details

TKIP and the related WPA standard, implement three new security features to address security problems encountered in WEP protected networks. First, TKIP implements a key mixing function that combines the secret root key with the initialization vector before passing it to the RC4 initialization. WEP, in comparison, merely concatenated the initialization vector to the root key, and passed this value to the RC4 routine. This permitted the vast majority of the RC4 based WEP related key attacks.[4] Second, WPA implements a sequence counter to protect against replay attacks. Packets received out of order will be rejected by the access point. Finally, TKIP implements a 64-bit message integrity check named MICHAEL.[5]

To be able to run on legacy WEP hardware with minor upgrades, TKIP uses RC4 as its cipher. TKIP also provides a rekeying mechanism. TKIP ensures that every data packet is sent with a unique encryption key.

Key mixing increases the complexity of decoding the keys by giving an attacker substantially less data that has been encrypted using any one key. WPA also implements a new message integrity code, named Michael. The message integrity check prevents forged packets from being accepted. Under WEP it was possible to alter a packet whose content was known even if it had not been decrypted.

Security

TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.

Notwithstanding these changes, the weakness of some of these additions have allowed for new, although narrower, attacks.[6]

Beck-Tews attack

TKIP is vulnerable to a keystream recovery attack that, if successfully executed, permits an attacker to transmit 7-15 packets of the attacker's choice on the network. The current publicly available TKIP-specific attacks do not reveal the Pairwise Master Key or the Pairwise Temporal Keys. On November 8, 2008, Martin Beck and Erik Tews released a paper detailing this attack method.[7]

The attack is an extension of the WEP chop-chop attack. Because WEP utilizes a cryptographically insecure checksum mechanism (CRC32), an attacker can guess individual bytes of a packet, and the wireless access point will confirm or deny whether or not the guess is correct. If the guess is correct, the attacker will be able to detect the guess is correct and continue to guess other bytes of the packet. However, unlike the chop-chop attack against a WEP network, the attacker must wait for at least 60 seconds after a correct guess (a successful circumvention of the CRC32 mechanism) before continuing the attack. This is because although TKIP continues to use the CRC32 checksum mechanism, it implements an additional MIC code named Michael. If two incorrect Michael MIC codes are received within 60 seconds, the access point will implement countermeasures, meaning it will rekey the TKIP session key, thus changing future keystreams. Accordingly, the Beck-Tews TKIP attack will wait an appropriate amount of time to avoid these countermeasures. Because ARP packets are easily identified by their size, and the vast majority of the contents of this packet would be known to an attacker, the number of bytes an attacker must guess using the above method is rather small (approximately 14 bytes). Beck and Tews estimate recovery of 12 bytes is possible in about 12 minutes on a typical network.

An attacker already has access to the entire ciphertext packet. Upon retrieving the entire plaintext of the same packet, the attacker has access to the keystream of the packet, as well as the MIC code of the session. Using this information the attacker can construct a new packet and transmit it on the network. To circumvent the WPA implemented replay protection, the Beck-Tews attack utilizes QoS channels to transmit these newly constructed packets. An attacker able to transmit these packets may be able to implement any number of attacks, including ARP poisoning attacks, denial of service, and other similar attacks.

In October 2009, Halvorsen with others made a further progress, enabling attackers to inject a larger malicious packet (596 bytes, to be more specific) within approximately 18 minutes and 25 seconds.

Ohigashi-Morii attack

Building on the Beck-Tews attack, Japanese researchers Toshihiro Ohigashi and Masakatu Morii reported a simpler and faster implementation of a similar attack.[8] It utilizes a similar attack method, but uses a man-in-the-middle attack and does not require the vulnerable access point to have Quality of Service enabled.

As with the Beck-Tews attack, the attack is only effective against TKIP, and not against WPA using AES.

See also

References

  1. ^ "Wi-Fi Alliance Announces Standards-Based Security Solution to Replace WEP". Wi-Fi Alliance. 2002-10-31. Retrieved 2007-12-21.
  2. ^ "IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements" (pdf). IEEE Standards. 2004-07-23. Retrieved 2007-12-21.
  3. ^ "802.11mb Issues List v12" (excel). 20-Jan-2009. p. CID 98. The use of TKIP is deprecated. The TKIP algorithm is unsuitable for the purposes of this standard {{cite web}}: Check date values in: |date= (help)
  4. ^ Edney, Jon (2003-07-15). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley Professional. ISBN 0-321-13620-9. {{cite book}}: Unknown parameter |coauthors= ignored (|author= suggested) (help)
  5. ^ IEEE-SA Standards Board. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Communications Magazine, IEEE, 2007.
  6. ^ "The Weakness of TKIP Encryption". 2010-01-20. Retrieved 2010-01-25.
  7. ^ Martin Beck & Erik Tews, "Practical attacks against WEP and WPA", available at [1].
  8. ^ A Practical Message Falsification Attack on WPA