COMP4690, HKBU1 Security of 802.11 COMP4690: Advanced Topic.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless Privacy: Analysis of Security Nikita Borisov UC Berkeley
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Lecture 24 Wireless Network Security
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
University of Malawi, Chancellor College
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Wireless Privacy: Analysis of Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
An Inductive Chosen Plaintext Attack against WEP/WEP2
Presentation transcript:

COMP4690, HKBU1 Security of COMP4690: Advanced Topic

COMP4690, HKBU2 Outline Introduction of Introduction of WEP Security of WEP References

COMP4690, HKBU3 Example of Single-Cell Wireless LAN

COMP4690, HKBU4 Example of Multi-Cell Wireless LAN

COMP4690, HKBU5 IEEE – infrastructure mode Smallest building block is Basic Service Set (BSS) A number of stations executing the same MAC protocol Compete for access to same shared wireless medium A BSS may be isolated, or may connect to a Backbone Distribution System (DS) through an Access Point (AP) AP functions as bridge MAC protocol may be distributed or controlled by a central coordination function in AP BSS generally corresponds to a “cell” DS can be a switch, wired network, or wireless network

COMP4690, HKBU6 IEEE – infrastructure mode BSS 1 BSS 2 Internet hub, switch or router AP

COMP4690, HKBU7 IEEE Protocol Architecture

COMP4690, HKBU8 Some history Cordless phones Analog cell phones Anybody with a scanner that operated at the right frequency could easily listen to calls not intended for them tried to avoid, but the same cycle still played out… Wireless access points must announce themselves to the world: by broadcasting beacon frames. Wandering users with an receiver can find out about wireless networks in the area simply by putting up an antenna. War driving: driving around looking for access points One quick solution: MAC-address filtering But malicious attackers can alter addresses (with sufficient operating system privileges).

COMP4690, HKBU9 Security of Existing security consists of two subsystems A data encapsulation technique called Wired Equivalent Privacy (WEP) An authentication algorithm called Shared Key Authentication Defined in Section 8 “Authentication and privacy” in the IEEE Std (in 1997).

COMP4690, HKBU10 WEP Wired Equivalent Privacy To protect authorized users of a wireless LAN from casual eavesdropping To create the privacy achieved by a wired network (using a switch) Because of the U.S. export regulations, WEP secret keys were limited to 40 bits. The rules were relaxed later. WEP has been an option feature. But WEP itself was a flawed anchor point for security. Even with “128-bit” version, WEP is still not secure!

COMP4690, HKBU11 WEP WEP relied on a secret key (40-bit) shared between the two peers (usually a mobile station and an access point). Before transmission of a frame: Checksumming: compute an integrity checksum on the message using CRC-32 algorithm, then concatenate the two into plaintext P Encryption: encrypt the plaintext P using RC4. This requires an initialization vector (IV). IV has only 24 bits. It is inserted into the frame in plaintext (so that the peer can decrypt the ciphertext).

COMP4690, HKBU12 WEP Encapsulation HdrData WEP Encapsulation Summary: Encryption Algorithm = RC4 Per-packet encryption key = 24-bit IV concatenated to a pre-shared key WEP allows IV to be reused with any frame Data integrity provided by CRC-32 of the plaintext data (the “ICV”) Data and ICV are encrypted under the per-packet encryption key HdrDataIVICV EncapsulateDecapsulate

COMP4690, HKBU13 WEP Encryption IV: 24-bit, how often to change IV values? Secret Key: 40-bit, be distributed by an external key management service Seed: 64-bit PRNG: Pseudo-Random Number Generator, using RC4 algorithm from RSA Data Security, Inc. ICV: 32-bit, using CRC-32

COMP4690, HKBU14 WEP Encryption Message: M Initialization vector (IV): v Integrity checksum (ICV): c(M) After concatenation: P = M || c(M) Key sequence: RC4(v, k) Ciphertext: C = P  RC4(v, k)

COMP4690, HKBU15 WEP Decryption

COMP4690, HKBU16 WEP Decryption The receiver gets v from the received frame. The receiver calculates the key sequence using RC4(v, k). The receiver decrypts the ciphertext using P = C  RC4(v, k) P is divided into two parts: M' and c' where c' contains the last 32 bits of P. If c(M') = c', the receiver will think that M' is the message.

COMP4690, HKBU17 Properties of Vernam Ciphers The WEP encryption algorithm RC4 is a Vernam Cipher: Pseudo-random number generator Encryption Key K Plaintext data byte p Random byte b  Ciphertext data byte p Decryption works the same way: p = c  b

COMP4690, HKBU18 Properties of Vernam Ciphers Thought experiment 1: what happens when p 1 and p 2 are encrypted under the same “random” byte b? c 1 = p 1  bc 2 = p 2  b Then: Conclusion: it is a very bad idea to encrypt any two messages using the same key sequence. The ciphertexts can be sniffered easily. So once p 1 is know, you can know p 2, and vice versa. c 1  c 2 = (p 1  b)  (p 2  b) = p 1  p 2

COMP4690, HKBU19 Keystream Reuse Keystream (or key sequence): RC(v, k) Usually k is fixed. How about v? It’s better to have different values of v for different packets: per-packet IV. However, “IV collision” is difficult to avoid: For some implementations, IV is reset to 0 when initialized, and incremented by one for each packet. IV has only 24 bits, too short!!!

COMP4690, HKBU20 How to Read WEP Encrypted Traffic (1) If IV is randomly chosen, by Birthday Paradox, probability P n that two packets will share same IV after n packets is P 2 = 1/2 24 after two frames and P n = P n–1 + (n–1)(1–P n–1 )/ 2 24 for n > 2. 50% chance of a collision exists already after only 4823 packets!!! Once two encrypted packets that use the same IV are discovered, various methods of attack can be applied to recover the plaintext. If the plaintext of one of the messages is knows, it is easy to derive the contents of the other one; and also other messages that have been encrypted using the same IV can be directly decrypted HdrDataIVICV 24 bits Encrypted under Key +IV using RC4

COMP4690, HKBU21 How to Read WEP Encrypted Traffic (2) Ways to accelerate the process: Send spam into the network: no pattern recognition required! Get the victim to send to you The AP creates the plaintext for you! Decrypt packets from one Station to another via an Access Point If you know the plaintext on one leg of the journey, you can recover the key stream immediately on the other Etc., etc., etc.

COMP4690, HKBU22 Data Integrity CRC checksum is insufficient to ensure data integrity. It is designed to detect random errors, not to stop malicious attackers! It is easy for attackers to modify the message and to inject messages without detection! Mainly because CRC is a linear function of the message: c(x  y) = c(x)  c(y)

COMP4690, HKBU23 Message Modification Assume C is the ciphertext of message M C = RC4(v, k)  (M||c(M)) For an attacker, he can easily capture C and v. But he doesn’t know k. The main purpose of the attacker is to replay a different message C' to the receiver without being detected. In another word, the receiver will get a wrong message M'.

COMP4690, HKBU24 Message Modification Given any E, the attacker can calculate its checksum c(E). Then the attacker generates C' as: C' = C  (E||c(E)) Once C' is received by the receiver, it will decrypt as follows: Therefore the receiver gets a wrong message M' = M  E.

COMP4690, HKBU25 Final answer? WPA: Wi-Fi Protected Access Intended as an intermediate measure to take the place of WEP while i was prepared i Ratified in June Supported by Intel, IBM, etc. AES-CCMP (Counter-Mode/CBC-MAC Protocol) WRAP (Wireless Robust Authenticated Protocol) 802.1x WPA2 WPA2 is the certified form of i tested by the Wi-Fi Alliance. WPA2 implements the mandatory elements of i.

COMP4690, HKBU26 References ISO/IEEE Std , Section 8, “MAC and PHY Specifications -- Authentication and Privacy”, 1999 Edition. Nikita Borisov, et al, “Intercepting Mobile Communications: the Insecurity of ”, W. A. Arbaugh, et al, “Your Wireless Network has No Clothes”, Matthew Gast, “Wireless LAN Security: a Short History”, 2002.