Published August 17, 2022 | Version v1
Conference paper Open

An Approach to Reduce Side-Channel Timing Attack in Dragonfly Handshake of WPA3 for MODP Group

Authors/Creators

Description

Due to the expansion of wireless networks and devices, security in this area has become a great concern; especially blocking unauthorized users is a major security challenge. While systematically evaluating Dragonfly Handshake of the newly announced Wi-Fi Protected Access 3 (WPA3), found a severe vulnerability called ‘Side-Channel Timing Leak’ in the password encoding method for ‘Modulo the Prime (MODP)’ to generate password element (PE), evidently release information about the password in all implementations. Making the manipulation of the flaw computationally intractable for an attacker, three actions: Fixing iterations number, single password-based PE database generation and fetching a PE of random choice from the database have been proposed. It has been demonstrated that variation in execution time and guessing password using different client MAC addresses is possible and analyzed that certain number of PE from same password and arbitrary calling of PE from a database raise complexity significantly for the adversary at the expense of extra storage.

Files

NISecurity modified paper.pdf

Files (614.0 kB)

Name Size Download all
md5:2f09adfc3c45fd34c96e23d887f85292
614.0 kB Preview Download