Paper 2019/801

A Chosen Random Value Attack on WPA3 SAE authentication protocol

Sheng Sun

Abstract

SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports the peer to peer (P2P) authentication, and is a major authentication mechanism of the Authentication and Key Management Suite (AKM). The SAE key exchange protocol and its variants, i.e, the Dragonfly key exchange protocol, have previously received some cryptanalysis, in which the authors pointed out Dragonfly protocol is vulnerable to the sub-group attack. This paper investigates some further vulnerabilities using impersonation attacks and suggests some protocol amendments for protection. It is recommended that SAE implementations should be upgraded to ensure protection against these attacks.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
SAEWPA3Dragonfly key exchange
Contact author(s)
robsun2005 @ gmail com
History
2019-07-14: received
Short URL
https://ia.cr/2019/801
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/801,
      author = {Sheng Sun},
      title = {A Chosen Random Value Attack on {WPA3} {SAE} authentication protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/801},
      year = {2019},
      url = {https://eprint.iacr.org/2019/801}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.