Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Martin Vuagnoux is active.

Publication


Featured researches published by Martin Vuagnoux.


international cryptology conference | 2003

Password Interception in a SSL/TLS Channel

Brice Canvel; Alain P. Hiltgen; Serge Vaudenay; Martin Vuagnoux

Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SSL/TLS.


international conference on selected areas in cryptography | 2007

Passive-only key recovery attacks on RC4

Serge Vaudenay; Martin Vuagnoux

We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector - a cryptographic scheme typically used by the WEP and WPA protocols to protect IEEE 802.11 wireless communications. First, we show how the previously discovered key recovery attacks can be improved by reducing the dependency between the secret key bytes. Then, we describe two new weaknesses related to the modulo operation of the key scheduling algorithm. Finally, we describe a passive-only attack able to significantly improve the key recovery process on WEP with a data complexity of 215 eavesdropped packets.


international conference on selected areas in cryptography | 2010

Discovery and exploitation of new biases in RC4

Pouyan Sepehrdad; Serge Vaudenay; Martin Vuagnoux

In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 as a black box, i.e. the secret key words as input and the keystream words as output. Our objective is to exhaustively find linear correlations between these elements. Thanks to this technique, 9 new exploitable correlations have been revealed. Finally, we exploit these weaknesses on RC4 to some practical examples, such as the WEP protocol. We show that these correlations lead to a key recovery attack on WEP with only 9800 encrypted packets (less than 20 seconds), instead of 24200 for the best previous attack.


international conference on supercomputing | 2007

About Machine-Readable Travel Documents

Serge Vaudenay; Martin Vuagnoux

Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.


international symposium on electromagnetic compatibility | 2010

An improved technique to discover compromising electromagnetic emanations

Martin Vuagnoux; Sylvain Pasini

The techniques generally used to detect compromising emanations are based on a wide-band receiver tuned on a specific frequency or a spectral analyzer with a limited bandwidth. However, these methods may not be optimal since a significant amount of information is lost during the signal acquisition. In this paper, we propose a straightforward but efficient approach which acquires raw signal directly from the antenna and processes the entire captured electromagnetic spectrum thanks to the computation of short time Fourier transforms. We applied this approach to detect potential compromising electromagnetic emanations radiated by modern keyboard. Since keyboards are often used to transmit confidential data such as passwords, these emanations could remotely reveal sensitive information such as keystrokes. Thanks to this method, we detected four different kinds of compromising electromagnetic emanations generated by wired and wireless keyboards. These emissions lead to a full or a partial recovery of the keystrokes. We implemented these side-channel attacks and our best practical attack fully recovered 95% of the keystrokes of a PS/2 keyboard at a distance up to 20 meters, even through walls.


Annual International Conference on the Theory and Applications of Cryptographic Techniques | 2011

Statistical Attack on RC4

Pouyan Sepehrdad; Serge Vaudenay; Martin Vuagnoux

In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by assuming that the first bytes of plaintext are known for each packet. We describe similar attacks for WPA. Firstly, we describe a distinguisher for WPA of complexity 243 and advantage 0.5 which uses 240 packets. Then, based on several partial temporary key recovery attacks, we recover the full 128-bit temporary key by using 238 packets. It works within a complexity of 296. So far, this is the best attack against WPA. We believe that our analysis brings further insights on the security of RC4.


fast software encryption | 2013

Smashing WEP in A Passive Attack

Pouyan Sepehrdad; Petr Sušil; Serge Vaudenay; Martin Vuagnoux

In this paper, we report extremely fast and optimised active and passive attacks against the old IEEE 802.11 wireless communication protocol WEP. This was achieved through a huge amount of theoretical and experimental analysis (capturing WiFi packets), refinement and optimisation of all the former known attacks and methodologies against RC4 stream cipher in WEP mode. We support all our claims by providing an implementation of this attack as a publicly available patch on Aircrack-ng. Our new attacks improve its success probability drastically. We adapt our theoretical analysis in Eurocrypt 2011 to real-world scenarios and we perform a slight adjustment to match the empirical observations. Our active attack, based on ARP injection, requires \(22\,500\) packets to gain success probability of \(50\,\%\) against a \(104\)-bit WEP key, using Aircrack-ng in non-interactive mode. It runs in less than \(5\) s on an off-the-shelf PC. Using the same number of packets, Aicrack-ng yields around \(3\,\%\) success rate. Furthermore, we describe very fast passive only attacks by just eavesdropping TCP/IPv4 packets in a WiFi communication. Our passive attack requires \(27\,500\) packets. This is much less than the number of packets Aircrack-ng requires in active mode (around \(37\,500\)), which is a huge improvement. We believe that our analysis brings on further insight to the security of RC4.


usenix security symposium | 2009

Compromising electromagnetic emanations of wired and wireless keyboards

Martin Vuagnoux; Sylvain Pasini


international cryptology conference | 2011

Statistical attack on RC4 distinguishing WPA

Pouyan Sepehrdad; Serge Vaudenay; Martin Vuagnoux


Proceedings of the 22th Chaos Communication Congress | 2005

Autodafé: an Act of Software Torture

Martin Vuagnoux

Collaboration


Dive into the Martin Vuagnoux's collaboration.

Top Co-Authors

Avatar

Serge Vaudenay

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Pouyan Sepehrdad

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Brice Canvel

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Sylvain Pasini

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Petr Sušil

École Polytechnique Fédérale de Lausanne

View shared research outputs
Researchain Logo
Decentralizing Knowledge