Thursday, August 27, 2009

A Practical Message Falsification Attack on WPA

In this paper, we propose a practical message falsification attack on any WPA
implementation. Firstly, in order to ease targets of limitation of wireless LAN
products, we apply the Beck-Tews attack to the man-in-the-middle (MITM) attack 3. The Beck-Tews attack on the MITM attack is not required to support
IEEE802.11e QoS features, it means that our attack can apply any WPA implementation.
Secondly, we discuss an effective implementation of the MITM attack
for the wireless LAN network. In the MITM attack, the user’s communication is
intercepted by an attacker until the attack ends. It means that the users may detect our attack when the execution time of the attack is large. Therefore, thirdly we give methods for reducing the execution time of the attack. As a result,the execution time of our attack becomes about one minute in the best case.

Download PDF

check also: New Attack Cracks Common Wi-Fi Encryption in a Minute

No comments: