Dragonblood - A Security Analysis of WPA3’s SAE Handshake
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
Background: Dragonfly in WPA3 and EAP-pwd
Convert password to MODP element
What about elliptic curves?
Hash-to-curve: WPA3 for (counter - 1; counter 40; counter:-)
Attack Optimizations Timing & cache attack result in password signature Both use the same brute-force algorithm
Invalid Curve Attack
Reflection Attack: EAP-pwd example
Other Implementation Vulnerabilities
Denial-of-Service Attack
Downgrade Against WPA3-Transition Transition mode: WPA2/3 use the same password
Crypto Group Downgrade Handshake can be performed with multiple curves Initiator proposes curve & responder accepts/rejects Spoof reject messages to downgrade used curve
Fundamental issue still unsolved On lightweight devices, doing 40 iterations is too costly Even powerfull devices are at risk: handshake might be offloaded the lightweight Wi-Fi chip itself
Conclusion
Thank you! Questions?
Taught by
TheIACR
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity