On the anaysis of stream cipher and its implementation
Project/Area Number |
23560455
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Multi-year Fund |
Section | 一般 |
Research Field |
Communication/Network engineering
|
Research Institution | Kobe University |
Principal Investigator |
MORII Masakatu 神戸大学, 工学(系)研究科(研究院), 教授 (00220038)
|
Project Period (FY) |
2011 – 2013
|
Project Status |
Completed (Fiscal Year 2013)
|
Budget Amount *help |
¥5,200,000 (Direct Cost: ¥4,000,000、Indirect Cost: ¥1,200,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2012: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2011: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
|
Keywords | ストリーム暗号 / 解読 / 無線LAN / RC4 / WEP / WPA-TKIP / SSL-TLS / 脆弱性 / WPA/TKIP / WPA/-TKIP |
Research Abstract |
Stream cipher is a widely-used in secured protocols. Especially, RC4 is adopted in a lot of standard protocols such as WEP, WPA and SSL/TLS as a standard encryption algorithm. We present the evaluation of these protocols based on the stream cipher. Firstly, we proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadcast setting, independently. We give an active attack, which is a method to slide the position of a target plaintext byte into later byte of the plaintext. Our attack injects any bytes into the head of the plaintext by using malicious JavaScript. It causes improvement in probability for recovering a lot of plaintext bytes. Secondly, we propose a secure WEP operation against key recovery attacks. The proposed method requires for attackers at least 100,000 packets to recover the WEP key. At last, we propose an executable attack in a real environment without requiring the man-in-the-middle attack on WPA-TKIP.
|
Report
(4 results)
Research Products
(39 results)