Paper 2019/801
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
Abstract
SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports the peer to peer (P2P) authentication, and is a major authentication mechanism of the Authentication and Key Management Suite (AKM). The SAE key exchange protocol and its variants, i.e, the Dragonfly key exchange protocol, have previously received some cryptanalysis, in which the authors pointed out Dragonfly protocol is vulnerable to the sub-group attack. This paper investigates some further vulnerabilities using impersonation attacks and suggests some protocol amendments for protection. It is recommended that SAE implementations should be upgraded to ensure protection against these attacks.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- SAEWPA3Dragonfly key exchange
- Contact author(s)
- robsun2005 @ gmail com
- History
- 2019-07-14: received
- Short URL
- https://ia.cr/2019/801
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/801, author = {Sheng Sun}, title = {A Chosen Random Value Attack on {WPA3} {SAE} authentication protocol}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/801}, year = {2019}, url = {https://eprint.iacr.org/2019/801} }