How to Break EAP-MD5 - Information Security Theory and Practice Access content directly
Conference Papers Year : 2012

How to Break EAP-MD5

Fanbao Liu
  • Function : Author
  • PersonId : 1009960


We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probability through off-line computations. This kind of attack can also be implemented successfully even if the underlying hash function MD5 is replaced with SHA-1 or even SHA-512.
Fichier principal
Vignette du fichier
978-3-642-30955-7_6_Chapter.pdf (350.92 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01534313 , version 1 (07-06-2017)





Fanbao Liu, Tao Xie. How to Break EAP-MD5. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.49-57, ⟨10.1007/978-3-642-30955-7_6⟩. ⟨hal-01534313⟩
98 View
2501 Download



Gmail Facebook X LinkedIn More