doc.: IEEE <doc#>

Slides:



Advertisements
Similar presentations
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Advertisements

CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 1 TGe Security Baseline David Halasz, Stuart Norman, Glen Zorn Cisco Systems,
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Message Authentication Code
History and Implementation of the IEEE 802 Security Architecture
Wireless Protocols WEP, WPA & WPA2.
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
WEP & WPA Mandy Kershishnik.
Secure Sockets Layer (SSL)
Some LB 62 Motions January 13, 2003 January 2004
TLS Receive Side Crypto Offload to NIC
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
doc.: IEEE <doc#>
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
An Inductive Chosen Plaintext Attack against WEP/WEP2
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
802.1X/ Issues Nancy Cam-Winget, Cisco Systems
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Antti Miettinen (modified by JJ)
Security of Wireless Sensor Networks
Roaming timings and PMK lifetime
Security Activities in IETF in support of Mobile IP
A Joint Proposal for Security
Roaming timings and PMK lifetime
Roaming timings and PMK lifetime
Presentation transcript:

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Overview of 802.11 Security PAR CREMA Jesse Walker, Intel Corporation <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

Goals Develop a wider understanding of network security requirements March 2001 Goals Develop a wider understanding of network security requirements Explain how 802.11 security works now Describe its major issues Understand what is being done to address the issues Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

802.11 Security Today Goals of existing 802.11 security March 2001 802.11 Security Today Goals of existing 802.11 security Existing security consists of two subsystems A data encapsulation technique called Wired Equivalent Privacy (WEP) An authentication algorithm called Shared Key Authentication Jesse Walker, Intel Corporation

Existing 802.11 Security Goals March 2001 Existing 802.11 Security Goals Create the privacy achieved by a wired network Only prevent intellectual property from leaking through casual browsing Simulate physical access control by denying access to unauthenticated stations Jesse Walker, Intel Corporation

WEP Encapsulation WEP Encapsulation Summary: March 2001 WEP Encapsulation 802.11 Hdr Data Encapsulate Decapsulate 802.11 Hdr Data IV ICV WEP Encapsulation Summary: Encryption Algorithm = RC4 Per-packet encryption key = 24-bit IV concatenated to a pre-shared key WEP allows IV to be reused with any frame Data integrity provided by CRC-32 of the plaintext data (the “ICV”) Data and ICV are encrypted under the per-packet encryption key Jesse Walker, Intel Corporation

WEP Authentication AP STA 802.11 Authentication Summary: March 2001 WEP Authentication STA AP Shared secret distributed out of band Challenge (Nonce) Response (Nonce RC4 encrypted under shared key) Decrypted nonce OK? 802.11 Authentication Summary: Authentication key distributed out-of-band Access Point generates a “randomly generated” challenge Station encrypts challenge using pre-shared secret Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today So What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 So What’s Wrong Today? Properties of Vernam Ciphers How to read WEP Encrypted Traffic How to authentication without the key Traffic modification Lessons Requirements for a networked data encapsulation scheme Jesse Walker, Intel Corporation <author>, <company>

Properties of Vernam Ciphers (1) March 2001 Properties of Vernam Ciphers (1) The WEP encryption algorithm RC4 is a Vernam Cipher: Pseudo-random number generator Encryption Key K Random byte b  Plaintext data byte p Ciphertext data byte p Decryption works the same way: p = c  b Jesse Walker, Intel Corporation

Properties of Vernam Ciphers (2) March 2001 Properties of Vernam Ciphers (2) Thought experiment 1: what happens when p1 and p2 are encrypted under the same “random” byte b? c1 = p1  b c2 = p2  b Then: c1  c2 = (p1  b)  (p2  b) = p1  p2 Conclusion: it is a very bad idea to encrypt any two bytes of data using the same byte output by a Vernam Cipher PRNG. Ever. Jesse Walker, Intel Corporation

How to Read WEP Encrypted Traffic (1) March 2001 How to Read WEP Encrypted Traffic (1) 802.11 Hdr Data IV ICV Encrypted under Key +IV using a Vernam Cipher 24 luxurious bits By the Birthday Paradox, probability Pn two packets will share same IV after n packets is P2 = 1/224 after two frames and Pn = Pn–1 + (n–1)(1–Pn–1)/ 224 for n > 2. 50% chance of a collision exists already after only 4823 packets!!! Pattern recognition can disentangle the XOR’d recovered plaintext. Recovered ICV can tell you when you’ve disentangled plaintext correctly. After only a few hours of observation, you can recover all 224 key streams. Jesse Walker, Intel Corporation

How to Read WEP Encrypted Traffic (2) March 2001 How to Read WEP Encrypted Traffic (2) Ways to accelerate the process: Send spam into the network: no pattern recognition required! Get the victim to send e-mail to you The AP creates the plaintext for you! Decrypt packets from one Station to another via an Access Point If you know the plaintext on one leg of the journey, you can recover the key stream immediately on the other Etc., etc., etc. Jesse Walker, Intel Corporation

How to Authenticate without the Key March 2001 How to Authenticate without the Key STA AP Challenge (Nonce) Response (Nonce RC4 encrypted under shared key) Decrypted nonce OK? With our background, an easy attack is obvious: Record one challenge/response with a sniffer Use the challenge to decrypt the response and recover the key stream Use the recovered key stream to encrypt any subsequent challenge Jesse Walker, Intel Corporation

Traffic Modification (1) March 2001 Traffic Modification (1) Vernam cipher thought experiment 2: how hard is it to change a genuine packet’s data, so ICV won’t detect the change? Answer: Easy as pie Represent an n-bit plaintext as an n-th degree polynomial: p = pnxn + pn–1xn–1 +  + p0x0 (each pi = 0 or 1) Then the plaintext with ICV can be represented as : px32 + ICV(p) = pnxn+32 + pn–1xn–31 +  + p0x32 + ICV(p) If the n+32 bit RC4 key stream used to encrypt the body is represented by the n+32nd degree polynomial b, then the encrypted message body is px32 + ICV(p) + b Jesse Walker, Intel Corporation

Traffic Modification (2) March 2001 Traffic Modification (2) But the ICV is linear, meaning for any polynomials p and q IVC(p+q) = ICV(p) + ICV(q) This means that if q is an arbitrary nth degree polynomial, i.e., an arbitrary change in the underlying message data: (p+q)x32 + ICV(p+q) + b = px32 + qx32 + ICV(p) + ICV(q) + b = ((px32 + ICV(p)) + b) + (qx32 + ICV(q)) Conclusion: Anyone can alter an WEP encapsulated packet in arbitrary ways without detection!! Jesse Walker, Intel Corporation

Lessons Data encryption by itself offers no protection from attack March 2001 Lessons Data encryption by itself offers no protection from attack “It’s access control, stupid” there is no meaningful privacy if the data authenticity problem is not solved It is profoundly easy to mis-use a cipher “don’t try this at home” Get any cryptographic scheme reviewed by professionals Jesse Walker, Intel Corporation

Requirements for a networked data encapsulation scheme March 2001 Requirements for a networked data encapsulation scheme Data traffic: packets must be authentication, not just encrypted packets must have sequence numbers to prevent replay Authentication: Mutual authentication required Per-packet keys have to be tied to the authentication Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

Encapsulation Proposal March 2001 Encapsulation Proposal Current TGe plan of record: Use AES-128 as the new cryptographic primitive Use AES in Offset Codebook Mode OCB mode Phil Rogaway submission to AES modes of operation algorithm provides both privacy and data integrity Add session sequence number to avoid replay Map base key to session key use OCB mode tag to compute session key, to minimize number of cryptographic primitives implemented Jesse Walker, Intel Corporation

AES Facts NIST standard for iterated block ciphers March 2001 AES Facts NIST standard for iterated block ciphers Block cipher: encrypts or decrypts 128-bit blocks of data, not individual bytes Uses 128-, 192-, or 256-bit keys Highly parallelizable Critical path instructions: 88 S-box, XOR6, XOR5, XOR2, MUX2 Performance 200 MHz Pentium Pro: 284 cycles/block Jesse Walker, Intel Corporation

Iterated Block Ciphers March 2001 Iterated Block Ciphers Multiplexor Register Combinational Logic Jesse Walker, Intel Corporation

OCB Mode (Full last block) March 2001 OCB Mode (Full last block) Message M = m1 m2 m3 … mn-1 mn m1  …  mn tag +  (n+1)L+R EK +  1L+R EK m1 c1 m2 c2 +  2L+R ... mn cn  nL+R +  nL+R  EK IV R Jesse Walker, Intel Corporation

OCB Mode (Partial last block) March 2001 OCB Mode (Partial last block) Message M = m1 m2 m3 … mn-1 mn m1  …  pad(mn) +  1L+R EK m1 c1 m2 c2 +  2L+R ... mn cn  nL+R +  nL+R  tag +  (n+1)L+R EK +  (n+2)L+R EK IV R Jesse Walker, Intel Corporation

AES-Based WEP Format Decapsulate Encapsulate 802.11 Hdr Data Seq Num March 2001 AES-Based WEP Format 802.11 Hdr Data Decapsulate Encapsulate Seq Num Data 802.11 Hdr 128-bit IV 128-bit MIC Jesse Walker, Intel Corporation

Rationale AES strong and fast and parallelizable March 2001 Rationale AES strong and fast and parallelizable OCB mode provides both data authenticity and encryption This avoids many common implementation and design errors Minimizes number of gates to implement Fast and parallelizable Doesn’t fail catastrophically if IV is reused Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

Approach Based on existing protocols 802.11enhancements March 2001 Approach Based on existing protocols Kerberos V (RFC 1510) GSS-API (RFC 2743) IAKERB (draft-ietf-cat-iakerb-05.txt) EAP-GSS (draft-aboba-pppext-eapgss-02.txt) EAP (RFC 2284) 802.1X/EAPOL 802.11enhancements MAC security management New model for authentication/association sequences Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 IEEE 802.1X Terminology Authenticator Authentication Server Supplicant Controlled port Uncontrolled port 802.1X created to control access to any 802 LAN used as a transport for Extensible Authentication Protocol (EAP, RFC 2284) Jesse Walker, Intel Corporation <author>, <company>

Authentication Server March 2001 802.1X Model AP Authentication Server STA Associate EAP Identity Request EAP Identity Response EAP Auth Request EAP Auth Response EAP-Success EAP-Success Authentication traffic Normal Data Port Status: Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 EAP Framework EAP provides a flexible link layer security framework Simple encapsulation protocol No dependency on IP ACK/NAK, no windowing No fragmentation support Few link layer assumptions Can run over any link layer (PPP, 802, etc.) Assumes no re-ordering Can run over lossy or lossless media Retransmission responsibility of authenticator (not needed for 802.1X or 802.11) EAP methods based on IETF standards Transport Level Security (TLS) (supported in Windows 2000) GSS_API (including Kerberos) Jesse Walker, Intel Corporation <author>, <company>

EAP-GSS and IAKERB EAP-GSS (draft-aboba-pppext-eapgss-02.txt) March 2001 EAP-GSS and IAKERB EAP-GSS (draft-aboba-pppext-eapgss-02.txt) Use of GSS_API authentication methods within EAP IAKerb (draft-ietf-cat-iakberb-05.txt) GSS-API method enabling proxy Kerberos STA not able to talk to KDC directly prior to authentication Initial authentication IAKERB enables STA to obtain TGT, Ticket to AP Handoff Ticket to AP Jesse Walker, Intel Corporation

Advertising Security Options March 2001 Advertising Security Options Modeled on “supported rates” AP advertises security options in probe response Placed in probe response only if STA requests it in probe request STAs collect this information prior to associations and can make association and roaming decisions based upon it Jesse Walker, Intel Corporation

Selecting security options March 2001 Selecting security options STA requests security options in association request from available options contained in probe response AP accepts/rejects association based on request contents No additional protocol handshakes necessary No impact on roaming performance Jesse Walker, Intel Corporation

Initial Contact AP KDC STA March 2001 Associate EAP Identity Request EAP Identity Response EAP-GSS Request (Empty) EAP-GSS Response (IAKERB: AS_REQ) AS_REQ AS_REP EAP-GSS Request (IAKERB: AS_REP) EAP-GSS Response (IAKERB: TGS_REQ) TGS_REQ EAP-GSS Request (IAKERB: TGS_REP) TGS_REP EAP IAKERB Response (Empty) EAP-Success EAP-Key (AP_REQ) EAP-Key (AP_REP) Jesse Walker, Intel Corporation

Operational Details Authentication method defaults to IAKERB March 2001 Operational Details Authentication method defaults to IAKERB STA can attempt SPNEGO AP can choose IAKERB if it doesn’t support anything else EAP-Key packets passed up and down via driver interface and 802.11 SAP On STA, GSS_API implementation needs to be able to generate AP_REQ, send it down to driver On AP, need ability to validate received AP_REQ, force 802.1X controlled port into authorized state 802.11 encryption turned on after AP_REQ/AP_REP exchange AP turns on encryption after sending AP_REP STA turns on encryption after receiving AP_REP If EAP-Key exchange occurs prior to completion of 802.1X, then part of the 802.1X exchange may be encrypted! Jesse Walker, Intel Corporation

Security Services Authentication of client to KDC (TGS_REQ) March 2001 Security Services Authentication of client to KDC (TGS_REQ) PADATA typically NOT used with AS_REQ! Authentication of KDC to client (AS_REP, TGS_REP) Session key for client-AP communication (TGS_REP, AP_REQ) TGT, Session key for client-KDC communication (AS_REP) Authentication of client to AP (AP_REQ) Authentication of AP to client (AP_REP) Jesse Walker, Intel Corporation

Assumes: APs can share identity and key March 2001 Roaming Within Realm AP KDC STA Reassociate EAP-Key (AP_REQ) EAP-Key (AP_REP) EAP-Success Assumes: APs can share identity and key Jesse Walker, Intel Corporation

Security Services Authentication method defaults to IAKERB March 2001 Security Services Authentication method defaults to IAKERB 802.11 encryption turned on after AP_REQ/AP_REP exchange Authentication of client to KDC (TGS_REQ) Authentication of KDC to client (AS_REP, TGS_REP) Session key for client-AP communication (TGS_REP, AP_REQ) TGT, Session key for client-KDC communication (AS_REP) Authentication of client to AP (AP_REQ) Authentication of AP to client (AP_REP) Jesse Walker, Intel Corporation

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March 2001 Agenda Introduction and Goals 802.11 Security Today What’s Wrong Today? Proposed Encapsulation Proposed Authentication, Authorization, and Key Management Summary Jesse Walker, Intel Corporation <author>, <company>

March 2001 Summary 802.11 security doesn’t meet any of its security objectives today 802.11 TGe is working to replace Authentication scheme using 802.1X and Kerberos Encryption scheme using AES in OCB mode More to come “The paint’s not dry” Jesse Walker, Intel Corporation