Key reinstallation attacks: Forcing nonce reuse in WPA2

M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation
flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …

RC4 encryption-A literature survey

P **dal, B Singh - Procedia Computer Science, 2015 - Elsevier
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in
this paper. We have summarized the various weaknesses of RC4 algorithm followed by the …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

All Your Biases Belong to Us: Breaking {RC4} in {WPA-TKIP} and {TLS}

M Vanhoef, F Piessens - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
We present new biases in RC4, break the Wi-Fi Protected Access Temporal Key Integrity
Protocol (WPA-TKIP), and design a practical plaintext recovery attack against the Transport …

Release the Kraken: new KRACKs in the 802.11 Standard

M Vanhoef, F Piessens - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known
attacks, systematically analyzing all handshakes, bypassing 802.11's official …

A Formal Analysis of {IEEE} 802.11's {WPA2}: Countering the Kracks Caused by Cracking the Counters

C Cremers, B Kiesl, N Medinger - 29th USENIX Security Symposium …, 2020 - usenix.org
The IEEE 802.11 WPA2 protocol is widely used across the globe to protect network
connections. The protocol, which is specified on more than three-thousand pages and has …

Multi-key security: The Even-Mansour construction revisited

N Mouha, A Luykx - Advances in Cryptology--CRYPTO 2015: 35th Annual …, 2015 - Springer
Abstract At ASIACRYPT 1991, Even and Mansour introduced a block cipher construction
based on a single permutation. Their construction has since been lauded for its simplicity …

Bad-token: denial of service attacks on WPA3

K Lounis, M Zulkernine - … of the 12th International Conference on …, 2019 - dl.acm.org
WPA3 (Wi-Fi Protected Access 3) is a certification that augments its predecessor WPA2 with
protection mechanisms, such as resistance against password dictionary attacks through …

Predicting, Decrypting, and Abusing {WPA2/802.11} Group Keys

M Vanhoef, F Piessens - 25th USENIX security symposium (USENIX …, 2016 - usenix.org
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys Page 1 This paper is
included in the Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • …

WPA3 connection deprivation attacks

K Lounis, M Zulkernine - Risks and Security of Internet and Systems: 14th …, 2020 - Springer
Abstract After the KRACK (Key Reinstallation AttaCK) attack on WPA2 (Wi-Fi Protected
Access 2) in Fall 2017, the Wi-Fi Alliance started develo** WPA3 which was announced in …