WEP & WPA Mandy Kershishnik.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Justin Kontny, Chris Nassouri, and Matt Martens.  The first generation wireless modems were created in the early 1980's by amateur radio operators. 
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wired Equivalent Privacy. INTRODUCTION Wired Equivalent Privacy (WEP) is a security algorithm for IEEE wireless networks. Introduced as part of.
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Re-evaluating the WPA2 Security Protocol
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
Methods of Securing LANs
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Network Security
A Wireless LAN Security Protocol
Wireless LAN Security CSE 6590.
Wireless LAN Security 4.3 Wireless LAN Security.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security Issues with Wireless Protocols
Presentation transcript:

WEP & WPA Mandy Kershishnik

Define for me.. . WEP- Wired Equivalent Privacy method to secure IEEE 802.11 wireless networks part of the IEEE 802.11 wireless networking standard IEEE 802.11- set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee

Define for me.. . WPA- Wi-Fi Protected Access class of systems to secure wireless (Wi-Fi) computer networks created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)

Overview.. . WEP in depth WPA in depth IUP’s summer issue Conclusion

WEP.. . provide confidentiality comparable to wired network Cryptanalysis unveiled several weaknesses WEP -> WPA in 2003 WEP -> WPA2 in 2004 ALL not lost.. . provides a level of security that may deter casual snooping

WEP.. . 128-bit WEP key Confidentiality: RC4 Integrity: CRC-32 checksum 128-bit WEP key 26 Hex characters (0-9 and A-F) 1 char = 4 bits (so… 4 * 26 = 104 bits) 24-bit IV (initialization vector)

Authentication (2 methods) WEP.. . Authentication (2 methods) 1) Open System WLAN client doesn’t have to provide credentials to “access point” during authentication Essentially, any client (regardless of key) can authenticate with the “access point” THEN attempt to associate No authentication actually occurs After authentication & association, WEP used for encryption of data frames (as long as client has correct keys)

WEP.. . 2) Shared Key Four-way challenge-response handshake 1) client station sends authentication request to “access point” 2) “access point” sends back clear-text challenge 3) client encrypts challenge text using the configured WEP key; sends it back in another AUTH request 4) “access point” decrypts material; compares it with clear-text sent; depending on success of comparison, the “access point” sends back a positive or negative response After the authentication and association, WEP can be used for encrypting the data frames

WEP.. . Security Flaws Short IVs & keys Static keys Keystreams that are too similar Decryption of 802.11 frames Static keys doesn't provide function that supports the exchange of keys among stations admins and users generally use the same keys for log periods of time Cyclic Redundancy Check (CRC) insecure is possible to alter the payload and update the message CRC without knowing WEP key

WPA.. . Created by Wi-Fi Alliance designed to work with all wireless NIC cards must be enabled and chosen in preference to WEP WEP is usually presented as the first security choice in most installation instructions “personal mode” passphrase often too short (6-8 chars)

WPA.. . 2 modes 1) designed for use with an IEEE 802.1X authentication server Encrypted RC4 stream cipher 128-bit key 48-bit IV (initialization vector) Temporal Key Integrity Protocol (TKIP) Dynamically changes keys as system used Defeats key recovery attacks on WEP Message Integrity Code (MIC) Algorithm- Michael Frame counter Prevents replay attacks

WPA.. . 2) Pre-shared key (PSK) mode designed for home and small office networks Passphrase 8 - 63 printable ASCII characters OR 64 HEX digits (256 bits) may be stored on user’s computer (avoid re-entry) Stored in Wi-Fi “access point” * strong passwords are crucial * some methods to bypass weak passphrases Software / hardware interface that adds Wi-Fi adapter or appliance to network Short challenge phrases

IUP & WEP / WPA.. . DUAL Broadcasting WPA- IUP network (TKIP) Visible WEP- AuthorizedUseOnly network Invisible

Conclusion.. . WEP in depth WPA in depth Security issues Application

Resources.. . http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9015559 http://www.techworld.com/mobility/wep.cfm http://www.wifinetnews.com/archives/007993.html http://sunsite.uakom.sk/sunworldonline/swol-05-1998/swol-05-connectivity.html