By: Anthony Gervasi & Adam Dickinson

Slides:



Advertisements
Similar presentations
Block Cipher Modes of Operation and Stream Ciphers
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Encryption/Decyprtion using RC4 Vivek Ramachandran.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Wired Equivalent Privacy (WEP)
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Foundations of Network and Computer Security J J ohn Black Lecture #24 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Computer Security CS 426 Lecture 3
AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.
By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
CSC-682 Advanced Computer Security
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Slide 1 Stream Ciphers uBlock ciphers generate ciphertext Ciphertext(Key,Message)=Message  Key Key must be a random bit sequence as long as message uIdea:
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Cipher July 2011.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date:
Encryption Protocols used in Wireless Networks Derrick Grooms.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Chapter 2 Symmetric Encryption.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
1 A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Systems Architecture Breaking WEP in less than 60 seconds A presentation by Roman Scherer and Rainer Rehak June 12 th.
Module 48 (Wireless Hacking)
By Eliezer Yucht Prepared under the supervision of Prof. Dana Ron
Network Security.
Network Security.
Chapter 8 Network Security.
Cryptography CS 555 Topic 15: Stream Ciphers.
Outline Desirable characteristics of ciphers Stream and block ciphers
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Pseudo Random Number Generators
Cryptography Lecture 16.
Security through Encryption
PART VII Security.
Security Of Wireless Sensor Networks
Symmetric-Key Encryption
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
RC4 RC
SYMMETRIC ENCRYPTION.
Security of Wireless Sensor Networks
Chapter -4 STREAM CIPHERS
Hashing Hash are the auxiliary values that are used in cryptography.
Information and Computer Security CPIS 312 Lab 4 & 5
Cryptanalysis Network Security.
Cryptography Lecture 15.
The RC4 Algorithm Network Security.
Presentation transcript:

By: Anthony Gervasi & Adam Dickinson RC4 and WEP By: Anthony Gervasi & Adam Dickinson

Overview Discussion of RC4 Algorithm Breaking RC4 as used in WEP (Wired Equivalent Privacy) protocol Response from RSA labs

RC4 Algorithm Developed by RSA labs Symmetric Stream Cipher Block Cipher that uses a different key for each block of plaintext in a stream. WEP generally uses a counter to change the key.

RC4 Description Two main parts: Notation: l = length of key KSA (Key Scheduling Algorithm) PRGA (Pseudo Random Generation Algorithm) Notation: S = {0, 1, 2, … N-1} is the initial permutation l = length of key

RC4 Description

RC4 Example Simple 4-byte example S = {0, 1, 2, 3} K = {1, 7, 1, 7} Set i = j = 0

KSA First Iteration (i = 0, j = 0, S = {0, 1, 2, 3}): j = (j + S[ i ] + K[ i ]) = (0 + 0 + 1) = 1 Swap S[ i ] with S[ j ]: S = {1, 0, 2, 3} Second Iteration (i = 1, j = 1, S = {1, 0, 2, 3}): j = (j + S[ i ] + K[ i ]) = (1 + 0 + 7) = 0 (mod 4) Swap S[ i ] with S[ j ]: S = {0, 1, 2, 3}

KSA Third Iteration (i = 2, j = 0, S = {0, 1, 2, 3}): j = (j + S[ i ] + K[ i ]) = (0 + 2 + 1) = 3 Swap S[ i ] with S[ j ]: S = {0, 1, 3, 2} Fourth Iteration (i = 3, j = 3, S = {0, 1, 3, 2}): j = (j + S[ i ] + K[ i ]) = (3 + 2 + 7) = 0 (mod 4) Swap S[ i ] with S[ j ]: S = {2, 1, 3, 0}

PRGA Reset i = j = 0, Recall S = {2, 1, 3, 0} i = i + 1 = 1 j = j + S[ i ] = 0 + 1 = 1 Swap S[ i ] and S[ j ]: S = {2, 1, 3, 0} Output z = S[ S[ i ] + S[ j ] ] = S[2] = 3

Analysis of RC4 Advantages Disadvantages Faster than DES Enormous key space (average of 1700 bits) Disadvantages Large number of “weak” keys 1 of 256 “Weak” keys can be detected and exploited with a high probability

Weaknesses of RC4 Almost all weaknesses are in the KSA since attacking the PRGA is fairly infeasible due to the huge effective key. The fastest known method requires 2700 time. The KSA can be attacked with several methods mainly because of the simple initialization permutation used. Invariance Weakness is the most devastating attack.

The Invariance Method Many devices that use RC4 use a Initialization Vector (IV) either before or after the key. This IV is often a simple counter. Certain patterns in the IV lead to a case where the S vector is basically unchanged all the way through a round. This gives you about a 5% chance of guessing one or more bytes of the key.

The Invariance Method If you collect many samples of these instances you can make a good guess at the key. For example, if you have 60 instances you can guess one or more key bytes with about 50% certainty. Since this attack is done on each byte independently it has a linear complexity instead of exponential complexity. So larger key values don’t help much.

Applying the Invariance Method to WEP In WEP the first part of the RC4 key is transmitted along with the message. We also know a portion of the plaintext since WEP has predefined headers such as the SNAP designation 0xAA in the first byte. ARP and IP also have predictable packet structures.

Applying the Invariance Method to WEP First, we must capture raw encrypted data packets from the network. This can be achieved using inexpensive off the shelf hardware and open source software. Once about 6 million packets are collected, we look for resolved cases where the permutation matrix is essentially unchanged and use them to predict the key bytes. We determine which packets are interesting based on the IV. We will now either have the key or be close enough that an exhaustive search will give us the key in seconds.

Invariance Method and SSL SSL is the main secure communication link used by websites. The Invariance Method does not apply to SSL since it uses hashing functions (SHA1 and MD5) on the key from the KSA, and because it does not re-key RC4 for each packet but rather uses the previous state for the next packet.

Response from RSA Labs WEP should be considered broken. Other cryptography is necessary to secure wireless communications. Algorithms such as SSL that use RSA’s recommendations and either hash the KSA output, or disregard the first 256 bits of the PRGA output, should still be completely secure.

Resources Fluhrer, Mantin, Shamir - Weakness in the Key Scheduling Algorithm of RC4. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf Stubblefield, Loannidis, Rubin – Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. http://www.cs.rice.edu/~astubble/wep/wep_attack.pdf Rivest – RSA Security Response to Weakness in the Key Scheduling Algorithm of RC4. http://www.rsasecurity.com/rsalabs/technotes/wep.html RC4 Encryption Algorithm. http://www.ncat.edu/~grogans/algorithm_breakdown.htm