Paper 2015/254

Tornado Attack on RC4 with Applications to WEP and WPA

Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, and Martin Vuagnoux

Abstract

In this paper, we construct several tools for building and manipulating pools of statistical correlations in the analysis of RC4. We develop a theory to analyze these correlations in an optimized manner. We leverage this theory to mount several attacks on IEEE 802.11 wireless communication protocols WEP and WPA. Based on several partial temporary key recovery attacks, we recover the full 128-bit temporary key of WPA by using $2^{42}$ packets. It works with complexity $2^{96}$. Then, we describe a distinguisher for WPA with complexity $2^{42}$ and advantage 0.5 which uses $2^{42}$ packets. Moreover, we report extremely fast and optimized active and passive attacks against WEP. This was achieved through an extensive amount of theoretical and experimental analysis (capturing WiFi packets), refinement and optimization of all the former known attacks and methodologies against RC4. Our theory is supported and verified by a patch on top of Aircrack-ng. Our new attack improves its success probability drastically. Our active attack, based on ARP injection, requires 22500 packets to gain success probability of 50\% against a 104-bit WEP key, using Aircrack-ng in non-interactive mode. It runs in less than 5 seconds on an off-the-shelf PC. Using the same number of packets, Aicrack-ng yields around 3\% success rate. Furthermore, we describe very fast passive only attacks by eavesdropping TCP/IPv4 packets in a WiFi communication. Our passive attack requires 27500 packets. This is much less than the number of packets Aircrack-ng requires in active mode (around 37500), which is a significant improvement. We believe that our analysis brings on further insight to the security of RC4.

Note: The editorial quality of the paper was improved, and the background was updated with new literature results.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
RC4WEPWPAStream CiphersWiFi
Contact author(s)
pou sepehrdad @ gmail com
History
2015-12-26: last of 2 revisions
2015-03-19: received
See all versions
Short URL
https://ia.cr/2015/254
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/254,
      author = {Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux},
      title = {Tornado Attack on RC4 with Applications to WEP and WPA},
      howpublished = {Cryptology ePrint Archive, Paper 2015/254},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/254}},
      url = {https://eprint.iacr.org/2015/254}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.