Personal View site logo
Make sure to join PV on Telegram or Facebook! Perfect to keep up with community on your smartphone.
Please, support PV!
It allows to keep PV going, with more focus towards AI, but keeping be one of the few truly independent places.
Wi-Fi WPA2 encryption attack
  • image

    Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet are confident they really have done serious damage to WPA2

    According to Iron Group CTO Alex Hudson, disclosure is due some time on Monday, October 16 during European hours.

    Info will be at

    https://www.krackattacks.com/

    and

    https://github.com/vanhoefm/krackattacks

    s1423.jpg
    442 x 246 - 23K
  • 1 Reply sorted by
  • As described in the introduction of the research paper, the idea behind a key reinstallation attack can be summarized as follows. When a client joins a network, it executes the 4-way handshake to negotiate a fresh encryption key. It will install this key after receiving message 3 of the 4-way handshake. Once the key is installed, it will be used to encrypt normal data frames using an encryption protocol. However, because messages may be lost or dropped, the Access Point (AP) will retransmit message 3 if it did not receive an appropriate response as acknowledgment. As a result, the client may receive message 3 multiple times. Each time it receives this message, it will reinstall the same encryption key, and thereby reset the incremental transmit packet number (nonce) and receive replay counter used by the encryption protocol. We show that an attacker can force these nonce resets by collecting and replaying retransmissions of message 3 of the 4-way handshake. By forcing nonce reuse in this manner, the encryption protocol can be attacked, e.g., packets can be replayed, decrypted, and/or forged. The same technique can also be used to attack the group key, PeerKey, TDLS, and fast BSS transition handshake.

    If you read it carefully you understand that system was specially designed this way (they have also fun addition about Linux and Android where it is even worse).
    Btw whole thing also works only due to artificial encryption weakness.

    Such security disclosures happens due to some global power things as authors of protocols in need to close some implanted issue to prevent it's usage.

    And this year it is 3rd such case.