How to Break EAP-MD5 - Information Security Theory and Practice
Conference Papers Year : 2012

How to Break EAP-MD5

Fanbao Liu
  • Function : Author
  • PersonId : 1009960

Abstract

We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probability through off-line computations. This kind of attack can also be implemented successfully even if the underlying hash function MD5 is replaced with SHA-1 or even SHA-512.
Fichier principal
Vignette du fichier
978-3-642-30955-7_6_Chapter.pdf (350.92 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01534313 , version 1 (07-06-2017)

Licence

Identifiers

Cite

Fanbao Liu, Tao Xie. How to Break EAP-MD5. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.49-57, ⟨10.1007/978-3-642-30955-7_6⟩. ⟨hal-01534313⟩
132 View
2769 Download

Altmetric

Share

More