Paper 2015/254
Tornado Attack on RC4 with Applications to WEP and WPA
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, and Martin Vuagnoux
Abstract
In this paper, we construct several tools for building and manipulating pools of statistical correlations in the analysis of RC4. We develop a theory to analyze these correlations in an optimized manner. We leverage this theory to mount several attacks on IEEE 802.11 wireless communication protocols WEP and WPA. Based on several partial temporary key recovery attacks, we recover the full 128-bit temporary key of WPA by using
Note: The editorial quality of the paper was improved, and the background was updated with new literature results.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- RC4WEPWPAStream CiphersWiFi
- Contact author(s)
- pou sepehrdad @ gmail com
- History
- 2015-12-26: last of 2 revisions
- 2015-03-19: received
- See all versions
- Short URL
- https://ia.cr/2015/254
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/254, author = {Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux}, title = {Tornado Attack on {RC4} with Applications to {WEP} and {WPA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/254}, year = {2015}, url = {https://eprint.iacr.org/2015/254} }