Doc.: 11-03-0632r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Removing the TKIP Specific Backdoor from the CCMP Mode of Encryption.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Advertisements

Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Doc.: IEEE /0283r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 Suggested Changes to the Abbreviated Handshake Date: Authors:
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Doc.: IEEE r1 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Click on Proceed for Bid Submission. Click on Go to Load the forms internally.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Wireless Authentication & 802.1X By Gareth Ayres.
Doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Doc.: IEEE /1077r0 Submission September 2010 Dan Harkins, Aruba NetworksSlide 1 Galois/Counter Mode (GCM) Date: Authors:
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Discussion on ax functional requirements
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Doc.: Submission January 22, 2014 Rene Struik (Struik Security Consultancy)Slide 1 TGai Motions Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /0964r0 Submission September 2010 David Halasz, AclaraSlide 1 Smart Grid and Key Lengths Date: Authors:
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia
Proposed solutions to comments on section 7
TGi Motions for Comment Resolution
BPSEC Updates Edward Birrane
Motions to Address Some Letter Ballot 52 Comments
doc.: IEEE xxx Bob Beach Symbol Technologies
TGaq Essential Requirements
Key Descriptor Version in EAPOL Key Frames
Nancy Cam-Winget, Cisco Systems Inc
IEEE i Dohwan Kim.
Multicast Replay Detection Fred Stivers, Texas Instruments
Fix inconsistency in PLM specification
July 2002 QoS Interactions Interaction of AES Message Integrity Check Processing with Quality of Service Paul Lambert, Woodside Networks, Inc.
Traffic Class Control in MBSS
Motions for 2007/09 Date: Authors: September 2007
Fixing the locked legacy slot condition
Traffic Class Control in MBSS
Nancy Cam-Winget, Cisco Systems Inc
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
AES Associated Data Optimization
TGi Preliminary Agenda
doc.: IEEE /454r0 Bob Beach Symbol Technologies
GCMP Restriction Date: Authors: January 2011 May 2010
Access distribution in ai
Clarifying TKIP MIC processing format Fred Stivers, Texas Instruments
CID#89-Directed Multicast Service (DMS)
CCMP MIC Processing Paul Lambert September 2002
Traffic Class Control in MBSS
Clause 7 Comment Resolutions
Link Adaptation Subfield for VHT
IEs in 4-way handshake description
WPA Coordination Changes
Encrypting Management Frames
Comment Resolution Motions
Presentation transcript:

doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Removing the TKIP Specific Backdoor from the CCMP Mode of Encryption Paul A. Lambert

doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 2 Background The “Use Group Key” cipher sets all STA-to-AP encryption keys to the same value. This is a problem, for example: –In a hotspot, users can monitor their neighbors traffic There is no way to tell when you have a pairwise key or when your neighbor also has your key. This mode was designed to support the security limitiations of some vendors legacy equipment using TKIP The TGi draft currently allow “Use Group Key” for all algorithms including AES

doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 3 Current “Use Group Key Text” “The cipher suite selector 00:00:00:0 “Use Group Key cipher suite” is only valid as the pairwise cipher suite. An AP may specify the selector 00:00:00:0 “Use Group Key cipher suite” for a pairwise key cipher suite if it does not support any pairwise cipher suites. An AP shall not specify the selector 00:00:00:0 “Use Group Key cipher suite” as the group key cipher suite selector.”

doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 4 Motion Append the following sentence to description of “Use Group Key” in section : "The selector 00:00:00:0 shall only be used as a pairwise cipher when the Group Key Cipher Suite is TKIP (selector 00:00:00:2)”.