Ads by TechWords

See your link here
Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Mobile/Wireless Computing
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
 

Once thought safe, WPA Wi-Fi encryption is cracked

November 6, 2008 12:00 PM ET

Active Comments
Anonymous says: Signal strength doesn't matter. The size of the antenna does!...
AnonymousReply says: A weak signal is not a safeguard. Any transmitted signal can be picked up. All it takes is a more...


IDG News Service - Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.

The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will show how he was able to crack WPA encryption and read data being sent from a router to a laptop computer. The attack could also be used to send bogus information to a client connected to the router.

To do this, Tews and his co-researcher Martin Beck found a way to break the Temporal Key Integrity Protocol (TKIP) key, used by WPA, in a relatively short amount of time: 12 to 15 minutes, according to Dragos Ruiu, the PacSec conference's organizer.

They have not, however, managed to crack the encryption keys used to secure data that goes from the PC to the router in this particular attack

Security experts had known that TKIP could be cracked using what's known as a dictionary attack. Using massive computational resources, the attacker essentially cracks the encryption by making an extremely large number of educated guesses as to what key is being used to secure the wireless data.

The work of Tews and Beck does not involve a dictionary attack, however.

To pull off their trick, the researchers first discovered a way to trick a WPA router into sending them large amounts of data. This makes cracking the key easier, but this technique is also combined with a "mathematical breakthrough," that lets them crack WPA much more quickly than any previous attempt, Ruiu said.

Tews is planning to publish the cryptographic work in an academic journal in the coming months, Ruiu said. Some of the code used in the attack was quietly added to Beck's Aircrack-ng Wi-Fi encryption hacking tool two weeks ago, he added.

WPA is widely used on today's Wi-Fi networks and is considered a better alternative to the original WEP (Wired Equivalent Privacy) standard, which was developed in the late 1990s. Soon after the development of WEP, however, hackers found a way to break its encryption, and it is now considered insecure by most security professionals. Store chain T.J. Maxx was in the process of upgrading from WEP to WPA encryption when it experienced one of the most widely publicized data breaches in U.S. history, in which hundreds of millions of credit card numbers were stolen over a two-year period.

A new wireless standard known as WPA2 is considered safe from the attack developed by Tews and Beck, but many WPA2 routers also support WPA.

"Everybody has been saying, 'Go to WPA because WEP is broken,'" Ruiu said. "This is a break in WPA."

If WPA is significantly compromised, it would be a big blow for enterprise customers who have been increasingly adopting it, said Sri Sundaralingam, vice president of product management at wireless network security vendor AirTight Networks. Although customers can adopt Wi-Fi technology such as WPA2 or virtual private network software that will protect them from this attack, there are still may devices that connect to the network using WPA, or even the thoroughly cracked WEP standard, he said.

Ruiu expects a lot more WPA research to follow this work. "It's just the starting point," he said. "Erik and Martin have just opened the box on a whole new hacker playground."


Reprinted with permission from

IDG.net
Story copyright 2009 International Data Group. All rights reserved.

Additional Resources

WEBINAR
In this webinar from LogMeIn, discover how "next generation" remote support tools are optimized to provide advanced capabilities like scripting, system diagnostics and smartphone support are empowering IT technicians to solve more issues, more quickly, for more end users. Live Broadcast June 11th, 2 PM ET. Register now!
WHITE PAPER
Technology is complex. Keeping it running productively shouldn't be. To that end, you want to minimize the number of solutions needed in-house to simplify operations, maintenance, and support. Kodak offers a best-practices model. One company provides support for both scanner and software, for fast problem resolution without vendor finger-pointing. Download now!
WHITE PAPER
Utilizing demand intelligence improves the precision of pricing, product assortments, channel/store placement, and promotion, which are all essential for sustainable revenue management performance. Learn more, download this free whitepaper today.

What People Are Saying

White Papers & Webcasts

SIP Trunking Is Key to Accelerating Unified Communications Deployments
(Source: Sprint) Companies today are undergoing a significant transformation to a more global Anywhere Enterprise™. Unified communications (UC) is a crucial component in...  

Managing Laptops Outside the Office
(Source: Absolute Software) In this webinar, learn how you can reduce costs by tracking mobile computers no matter where they are located. Featuring...

Seamless Communications: Simplicity, Efficiency, and Transparency Achieved Through Integrated Wireline and Wireless Services
(Source: Sprint) This IDC White Paper provides analysis of the convergence between wireline and wireless technologies and the opportunities this evolution offers to...  

What Are 'Free' Remote Support Tools Really Costing You?
(Source: LogMeIn) In this webinar from LogMeIn, discover how "next generation" remote support tools are optimized to provide advanced capabilities like scripting, system...

The Human Factor in Laptop Encryption
(Source: Absolute Software) This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many...  

How to Future-proof for Mobility: An Integrated Management and Security Strategy
(Source: Sybase) This on-demand video webcast features John Girard, Gartner VP and distinguished Analyst, discussing the value of an integrated management...

Intelligent Client-Side Defense for Stolen Computers by Intel® and Absolute
(Source: Absolute Software) The combination of Absolute's SaaS-based computer tracking and Intel's hardware-based Anti-Theft technology gives you an unprecedented level of theft deterrence...  

IT Strategies for Remotely Supporting a Distributed Workforce
(Source: Citrix Online) Today's workforce is a distributed one - workers across industries are telecommuting, working out of satellite offices and connecting into...

Ponemon Study: The Business Risk of Lost Laptops
(Source: Dell) Employees can access and store enormous amounts of confidential data on your organization's laptops, leaving your company vulnerable to substantial business...  

Data Center Eco-Nomics
(Source: HP) Not only is it possible to gain a rapid ROI from your green computing efforts while at the same time laying...

Visit the BlackBerry Mobility Zone
Enhance the productivity of your organization by pushing data out to where it's needed most - your mobile workforce.