{"id":"https://openalex.org/W2767098552","doi":"https://doi.org/10.1145/3133956.3134027","title":"Key Reinstallation Attacks","display_name":"Key Reinstallation Attacks","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2767098552","doi":"https://doi.org/10.1145/3133956.3134027","mag":"2767098552"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3134027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/123456789/620017","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065091484","display_name":"Mathy Vanhoef","orcid":"https://orcid.org/0000-0002-8971-9470"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Mathy Vanhoef","raw_affiliation_strings":["imec-DistriNet, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-DistriNet, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008329832","display_name":"Frank Piessens","orcid":"https://orcid.org/0000-0001-5438-153X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Frank Piessens","raw_affiliation_strings":["imec-DistriNet, KU Leuven, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-DistriNet, KU Leuven, KU Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065091484"],"corresponding_institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":35.9643,"has_fulltext":false,"cited_by_count":354,"citation_normalized_percentile":{"value":0.99829319,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1313","last_page":"1328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.9384866952896118},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.8968489170074463},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.7904962301254272},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7705214023590088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7358734011650085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6883992552757263},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5870541930198669},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5732277035713196},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.563423216342926},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5123406648635864},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47407808899879456},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.43736347556114197},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4368308484554291},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4364449381828308},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4132946729660034},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.06574931740760803}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.9384866952896118},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.8968489170074463},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.7904962301254272},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7705214023590088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7358734011650085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6883992552757263},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5870541930198669},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5732277035713196},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.563423216342926},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5123406648635864},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47407808899879456},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.43736347556114197},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4368308484554291},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4364449381828308},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4132946729660034},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.06574931740760803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3133956.3134027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/620017","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/620017","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX, 30 October - 3 November 2017","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/620017","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/620017","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX, 30 October - 3 November 2017","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1416027901","https://openalex.org/W1439967542","https://openalex.org/W1495444061","https://openalex.org/W1542059364","https://openalex.org/W1554312721","https://openalex.org/W1554501433","https://openalex.org/W1556597491","https://openalex.org/W1584498424","https://openalex.org/W1585213850","https://openalex.org/W1662746580","https://openalex.org/W1769343819","https://openalex.org/W1864901766","https://openalex.org/W1877660496","https://openalex.org/W1966819490","https://openalex.org/W1969467786","https://openalex.org/W1970027746","https://openalex.org/W2002443910","https://openalex.org/W2014936340","https://openalex.org/W2027139435","https://openalex.org/W2075288390","https://openalex.org/W2095489381","https://openalex.org/W2114566185","https://openalex.org/W2117882740","https://openalex.org/W2139985879","https://openalex.org/W2142081526","https://openalex.org/W2145994227","https://openalex.org/W2157921329","https://openalex.org/W2158739533","https://openalex.org/W2160609613","https://openalex.org/W2165477067","https://openalex.org/W2288632536","https://openalex.org/W2346532176","https://openalex.org/W2404356415","https://openalex.org/W2469403219","https://openalex.org/W2488274487","https://openalex.org/W2489490928","https://openalex.org/W2532335977","https://openalex.org/W2536707834","https://openalex.org/W2564798724","https://openalex.org/W2573146560","https://openalex.org/W4285719527","https://openalex.org/W6632410262","https://openalex.org/W6705054864"],"related_works":["https://openalex.org/W2765230662","https://openalex.org/W199184564","https://openalex.org/W4315630311","https://openalex.org/W1980803971","https://openalex.org/W2100678814","https://openalex.org/W2594692618","https://openalex.org/W2995980218","https://openalex.org/W2767098552","https://openalex.org/W1544735678","https://openalex.org/W3165237296"],"abstract_inverted_index":{"We":[0],"introduce":[1],"the":[2,23,44,51,79,90,111,117,141,155,160,196,210,254],"key":[3,86,136,213],"reinstallation":[4,87,137],"attack.":[5,45,88],"This":[6,21,100,178],"attack":[7,138,245],"abuses":[8],"design":[9],"or":[10],"implementation":[11],"flaws":[12],"in":[13,163,214,227],"cryptographic":[14,38],"protocols":[15],"to":[16,54,84,131,182,237],"reinstall":[17],"an":[18,97,168],"already-in-use":[19,98],"key.":[20,59,99,262],"resets":[22],"key's":[24],"associated":[25,113],"parameters":[26,114],"such":[27,115],"as":[28,116],"transmit":[29,119],"nonces":[30],"and":[31,70,105,123,145,159,172,186,194,205,229],"receive":[32,124],"replay":[33,171],"counters.":[34],"Several":[35],"types":[36],"of":[37,240],"Wi-Fi":[39,48,233],"handshakes":[40],"are":[41,129],"affected":[42],"by":[43,103],"All":[46],"protected":[47],"networks":[49],"use":[50],"4-way":[52,80],"handshake":[53,64,81,107,156],"generate":[55],"a":[56,85,93,258],"fresh":[57],"session":[58],"So":[60],"far,":[61],"this":[62],"14-year-old":[63],"has":[65],"remained":[66],"free":[67],"from":[68],"attacks,":[69],"is":[71,82,101,198,219,235,246],"even":[72],"proven":[73],"secure.":[74],"However,":[75],"we":[76,223],"show":[77],"that":[78,231],"vulnerable":[83,236],"Here,":[89],"adversary":[91,169],"tricks":[92],"victim":[94],"into":[95,190,256],"reinstalling":[96,110],"achieved":[102],"manipulating":[104],"replaying":[106],"messages.":[108],"When":[109],"key,":[112,144],"incremental":[118],"packet":[120,125],"number":[121,126],"(nonce)":[122],"(replay":[127],"counter)":[128],"reset":[130],"their":[132],"initial":[133],"value.":[134],"Our":[135],"also":[139],"breaks":[140],"PeerKey,":[142],"group":[143],"Fast":[146],"BSS":[147],"Transition":[148],"(FT)":[149],"handshake.":[150],"The":[151],"impact":[152,197],"depends":[153],"on":[154],"being":[157],"attacked,":[158],"data-confidentiality":[161],"protocol":[162],"use.":[164],"Simplified,":[165],"against":[166,249],"AES-CCMP":[167],"can":[170,201],"decrypt":[173],"(but":[174],"not":[175],"forge)":[176],"packets.":[177],"makes":[179],"it":[180,218,252],"possible":[181],"hijack":[183],"TCP":[184],"streams":[185],"inject":[187],"malicious":[188],"data":[189],"them.":[191],"Against":[192],"WPA-TKIP":[193],"GCMP":[195,208],"catastrophic:":[199],"packets":[200],"be":[202],"replayed,":[203],"decrypted,":[204],"forged.":[206],"Because":[207],"uses":[209],"same":[211],"authentication":[212],"both":[215],"communication":[216],"directions,":[217],"especially":[220],"affected.":[221],"Finally,":[222],"confirmed":[224],"our":[225,241,244],"findings":[226],"practice,":[228],"found":[230],"every":[232],"device":[234],"some":[238],"variant":[239],"attacks.":[242],"Notably,":[243],"exceptionally":[247],"devastating":[248],"Android":[250],"6.0:":[251],"forces":[253],"client":[255],"using":[257],"predictable":[259],"all-zero":[260],"encryption":[261]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":31},{"year":2024,"cited_by_count":38},{"year":2023,"cited_by_count":43},{"year":2022,"cited_by_count":39},{"year":2021,"cited_by_count":35},{"year":2020,"cited_by_count":52},{"year":2019,"cited_by_count":53},{"year":2018,"cited_by_count":57},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2017-11-10T00:00:00"}
