highpowerrouter
  • desktop
  • Tablet
  • monitor
  • router
  • Digital life
  • English
    • English
    • Serbian (Latin)
    • Finnish
    • Czech
    • Bulgarian
    • Japanese
  • Home
  • router
  • WPA3 is not possible to guess the key by adopting "SAE", Kracks will be abused hole, appeared from the end of 2018?
23 Feb, 2023

WPA3 is not possible to guess the key by adopting "SAE", Kracks will be abused hole, appeared from the end of 2018?

By the way, what SAE is, this is actually IEEE 802.11 Section 12.4.In the method specified in 1, there is even a description of the "DRAGONFLY (RFC7664)" derivative form.

The figure below shows the outline of the SAE.In SAE, the key is replaced using an elliptical curve code.First, parameters of the ellipse itself (IEEE 802).In the case of 11, consider the ellipse that is "y^2 = x^3+ax+b mod p", and replace the A and B at this time.Access points and clients enter a password when choosing SSID (ESSID) to be connected, but based on this, a function called "generator" is used to generate an elliptical position (Point R).Apart from that, we have two random numbers, U/V, respectively.

And in the authentication, first from the client, U and U2.R, V and V2 from access points.It will be sent out of R.This is the form of receiving this with each other, and each of them generates the key.The important thing here is that the elliptical position R, which is required by calculation, has never appeared in the communication.In theory, R value is U2.R or v2.Although it is included in R, both U2 and V2 are random numbers, so you cannot guess R from here.

And we do not speculate the key here because the key has been able to generate the key correctly by sending each other to generate the key to each other.

WPA3は「SAE」採用で鍵の推測が不可能に、KRACKsで悪用の穴ふさぐ、2018年末から登場?

Thus, as long as you know the common password, you can have a common key to each other, and you cannot guess this from the outside.The key created here is PMK, and then generate TPK or GTK from here, and use each.

By the way, the fact that this method is resistant to speculation attacks on passwords using dictionaries, etc., even if this protocol is intercepted, it is transmitted from the random number called U/V, so it cannot be guessed the value of R.。Furthermore, between access points and clients, it is not possible to judge whether the password matches or not, because it only sends a hash instead of the success / failure of authentication.

For this reason, if you attack, you will have to repeat the decision that this password is wrong because it does not work.In other words, running a dictionary attack will take a lot of time.

Also, in the previous article, "protection even if the password specified by the user is not suitable for the recommended strength" is used to determine the position on an elliptical instead of using the password as it is.Because of the fact, whether the password itself is short or long, the intensity after the conversion is the same (it is just a coordinate), so it is relatively safe.Of course, this is the only story of being eavesdropped by Wi-Fi.

By the way, the "Wi-Fi Certified ENHANCED OPEN" described in the previous article is still unknown, but it seems that it will probably be "Opportunistic Wireless Encryption" specified in the "RFC8110".。

This is also based on an elliptical code, but there is no password because it is an open network.For this reason, the position G on the elliptical is determined in advance.However, since access points and clients generate random numbers with each other and combine them with G, it is the same as SAE that G cannot be guessed by eavesdropping, so I think that at least the secret of communication can be covered.It is being.

Once you have succeeded in replacing the key, you will use EAPOL's 4-Way Handshake, etc. for the login procedure that is often required for open networks.However, since the key has already been replaced, it is possible to encrypt it (the actual method is unknown because the specifications of Wi-Fi Certified Enhanced Open are not clear, but GTK based on the generated PMK.It is thought that it will be encrypted by this).KRACKS was possible only because 4-Way HandShake was performed in a plain text, but it can also respond to these attacks.

Prev Next
Tags: What does router WPS mean?

Category

  • desktop
  • Tablet
  • monitor
  • router
  • Digital life

Related Articles

  • Buffalo releases 2 models of Wi-Fi 6 router collaboration with anime "Thai Bunny 2"

    Buffalo releases 2 models of Wi-Fi 6 router collaboration with anime "Thai Bunny 2"

    23 Feb, 2023 - By highpowerrouter
  • Learn from Levi's Why you should renovate your aging ERP even if you're late: CIO Dive

    Learn from Levi's Why you should renovate your aging ERP even if you're late: CIO Dive

    23 Feb, 2023 - By highpowerrouter
  • Privacy is a human right. Browser "Tor" that anonymizes the connection source is in a pinch due to lack of servers

    Privacy is a human right. Browser "Tor" that anonymizes the connection source is in a pinch due to lack of servers

    23 Feb, 2023 - By highpowerrouter
  • Compact hotel "First Cabin Kansai Airport" from 6200 yen per night at Aeroplaza directly connected to Kansai Airport

    Compact hotel "First Cabin Kansai Airport" from 6200 yen per night at Aeroplaza directly connected to Kansai Airport

    23 Feb, 2023 - By highpowerrouter
  • Visualize your time and sharpen your actions! "aTime Logger 2"

    Visualize your time and sharpen your actions! "aTime Logger 2"

    23 Feb, 2023 - By highpowerrouter

Hot Articles

  •  Optional patch "KB5010414" is now available for Windows 11. Addresses taskbar enhancements and print / driver issues.Install as needed
    Optional patch "KB5010414" is now available for Windows 11. Addresses taskbar enhancements and print / driver issues.Install as needed
    23 Feb, 2023 - By highpowerrouter
  • A story about mice becoming sticky due to hydrolysis
    A story about mice becoming sticky due to hydrolysis
    23 Feb, 2023 - By highpowerrouter
  • How to Choose a Gaming Monitor
    How to Choose a Gaming Monitor
    23 Feb, 2023 - By highpowerrouter
  • Harnessing Rays: The Revolutionary Rise of Micro Solar Technology
    Harnessing Rays: The Revolutionary Rise of Micro Solar Technology
    23 Feb, 2023 - By highpowerrouter
  • HONOR X8a: How the mid-range smartphone redefines camera technology with its 100MP camera system
    HONOR X8a: How the mid-range smartphone redefines camera technology with its 100MP camera system
    23 Feb, 2023 - By highpowerrouter

Copyright © 2023 highpowerrouter.com. All rights reserved.