TKIP Key Mixing Code And Vectors

Slides:



Advertisements
Similar presentations
Doc.: IEEE /611r6 Submission December Mark Matson, Broadcom; David Johnston, Mobilian.Slide 1 Improved CCMP PN Usage Mark Matson
Advertisements

系 統 程 式 System Programming
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Binary & Decimal numbers = 3* * *10 + 5*1 = 3* * * *10 0 Decimal system: Ten digits: 0,1,2,3,…,9 Example:
+======-========-========-========-========-========-========-========-========+ | Bit| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | |Byte | | | | | | | | | |======+=======================================================================|
Representing Information as Bit Patterns Lecture 4 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
Portability CPSC 315 – Programming Studio Spring 2008 Material from The Practice of Programming, by Pike and Kernighan.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Data Representation Prepared by Dr P Marais (Modified by D Burford)
Aloha Aloha What you see: What the computer sees: binary number columns binary number columns
Comp Sci 251 Intro 1 Computer organization and assembly language Wing Huen.
Lesson 6. GCSE Computing – programming languages Candidates should be able to:  describe common tools and facilities available in an integrated development.
Bobby Bodenheimer CS 258 Introduction to Graphics Fall 2003 The Tiff Image Specification.
Recitation 6 – 2/26/01 Outline Linking Exam Review –Topics Covered –Your Questions Shaheen Gandhi Office Hours: Wednesday.
REGISTER TRANSFER LANGUAGE MICROOPERATIONS. TODAY OUTLINES Logic Microoperations Shift Microoperations.
SEC (1.4) Representing Information as bit patterns.
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Removing the TKIP Specific Backdoor from the CCMP Mode of Encryption.
AES Encryption FIPS 197, November 26, Bit Block Encryption Key Lengths 128, 192, 256 Number of Rounds Key Length Rounds Block.
Doc.: 802_Handoff_Work_Package_Discussion_r1 Submission September David Johnston, IntelSlide 1 IEEE 802 Handoff ECSG Work Package Discussion David.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Arithmetic and Logic Chapter 5
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
1 Sec (2.4) Arithmetic / logic instruction:. 2 Logical operations: Ex: XOR OR AND
Bit Manipulation in 'C' 'C' bit operators
Doc.: IEEE /XXXXr0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Constructing unique key streams for Management Frame Protection Notice:
Binary IO Writing and Reading Raw Data. Files Two major flavors of file: Text Binary.
Starting Out With Java 5 Control Structures to Objects By Tony Gaddis Copyright © 2005 Pearson Addison- Wesley. All rights reserved. Chapter 1 Slide #1.
Variables Bryce Boe 2012/09/05 CS32, Summer 2012 B.
Lecture Coding Schemes. Representing Data English language uses 26 symbols to represent an idea Different sets of bit patterns have been designed to represent.
Binary & Decimal numbers
WEP2 Enhancements Russ Housley, RSA Labs Doug Whiting, HiFn
or call for office visit, or call Kathy Cheek,
Security Enhancement to FTM
Representing Information as bit patterns
Binary Code  
Motions to Address Some Letter Ballot 52 Comments
Code Coverage David Inglis November 18, 2018.
Computer Programming Machine and Assembly.
IEEE i Dohwan Kim.
PART VII Security.
Clarified CCM Diagrams
REGISTER TRANSFER LANGUAGE
Multicast Replay Detection Fred Stivers, Texas Instruments
Some of this slide set is from Section 2,
Motion to resolve comment 46
Bitwise Operators CS163 Fall 2018.
Introduction to HTML Simple facts yet crucial to beginning of study in fundamentals of web page design!
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
TKIP.
January 2009 Closing Report for TGmb
1. Identify the following mixed number.
Multicast Replay Detection Fred Stivers, Texas Instruments
Block Ciphers: DES and AES
GCMP Restriction Date: Authors: January 2011 May 2010
-.&- ·Af& Q 0 "i'/
Clarifying TKIP MIC processing format Fred Stivers, Texas Instruments
A floating point multiplier behavior model.
Result: Yes - ; No - ; Abstain - .
Link Adaptation Subfield for VHT
802 Handoff ECSG Nov-03 Opening Plenary Report
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
BETONLINEBETONLINE A·+A·+
802.11s motion Date: Authors: November 2007 Month Year
Group Key Optimizations
Exploitation Part 1.
IEs in 4-way handshake description
Bit Manipulations CS212.
WPA Coordination Changes
Presentation transcript:

TKIP Key Mixing Code And Vectors November, 2002 TKIP Key Mixing Code And Vectors David Johnston david.johnston@ieee.org David Johnston, Mobilian.

PN We now have the 48 bit PN, common to TKIP and CCMP. November, 2002 PN We now have the 48 bit PN, common to TKIP and CCMP. Existing TKIP code and vectors do not adequately relate PN to TSC_[012], IV16 and IV32 David Johnston, Mobilian.

Reference C Code Byte Oriented Fully endian tolerant Single .c file November, 2002 Reference C Code Byte Oriented Fully endian tolerant *, % and / used for shifting and masking Single .c file ANSI C ANSI Standard libraries only A standard can be referenced to determine meaning Compiles easily gcc –o key_mixing key_mixing.c David Johnston, Mobilian.

Vectors Makes endianess of TK Clear November, 2002 Vectors Makes endianess of TK Clear Makes relationship between PN, IV32, IV16 and transmit order clear Same results as previous vectors. No fundamental algorithm change. David Johnston, Mobilian.

Vector Example Test vector #5: November, 2002 Vector Example Test vector #5: TK = 98 3A 16 EF 4F AC B3 51 AA 9E CC 27 1D 73 09 E2 [LSB on left, MSB on right] TA = 50-9C-4B-17-27-D9 PN = F0A410FC058C [transmitted as: 8C 25 05 DefKeyID FC 10 A4 F0] IV32 = F0A410FC IV16 = 058C P1K = F2DF EBB1 88D3 5923 A07C RC4KEY= 05 25 8C F4 D8 51 52 F4 D9 AF 1A 64 F1 D0 70 21 David Johnston, Mobilian.

November, 2002 Motion Move that the editor incorporate into the draft the text described in document 11-02-701r0-TKIPKeyMixingCodeAndVectors David Johnston, Mobilian.