Wireless Encryption By: Kara Dolansky Network Management Spring 2009.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Network Security.
CP3397 ECommerce.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Cryptography and Network Security Chapter 17
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Mobile and Wireless Security INF245 Guest lecture by Bjorn Jager Molde University College.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Chapter 8 Web Security.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Mobile and Wireless Communication Security By Jason Gratto.
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
WEP Protocol Weaknesses and Vulnerabilities
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
System Security: Cryptography Technologies CPE Operating Systems
Network Security David Lazăr.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public Key Encryption.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 14 Network Encryption
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Electronic Banking & Security Electronic Banking & Security.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure Sockets Layer (SSL)
Public-Key, Digital Signatures, Management, Security
Unit 8 Network Security.
Presentation transcript:

Wireless Encryption By: Kara Dolansky Network Management Spring 2009

Introduction What is Wireless Encryption? Why Encrypt? History OSI Model Types of Encryption How it works ProtocolsCracking Authorities / Standards

What is Wireless Encryption? General method of scrambling data Data is transformed to be unintelligible Invisible to the end user Operates independently of any other encryption processes Data is encrypted ONLY while in transit

Why Encrypt? Unauthorized Individuals may: Use up your bandwidth Use up your bandwidth Access files without authorization Access files without authorization Freely eavesdrop without making a connection Freely eavesdrop without making a connection Private correspondence Sensitive company information

Why Encrypt? Security: Personal data & passwords Personal data & passwords Credit Card information Social Security Numbers Bank Account information Protect your PC and files Protect your PC and files Protect classified information Protect classified information Identity theft or MAC spoofing

History Cryptography began ~2000 B.C. in early Egyptian days in early Egyptian days It has been used for War, Diplomacy, & Politics Diplomacy, & Politics Originally used with computers for confidential government data: military use Currently, all sensitive data is encrypted (or at least should be!)

OSI Model Encryption is a network security process Applies crypto services at the network transfer layer

Types of Encryption End to End: Message is encrypted when it is transmitted & decrypted when it is received Message is encrypted when it is transmitted & decrypted when it is received Message remains encrypted from start to finish Message remains encrypted from start to finish It is efficient (the network does not need to have special encryption facilities) It is efficient (the network does not need to have special encryption facilities) Disadvantage: Only secures the contents Disadvantage: Only secures the contents

Types of Encryption Link: Message is encrypted when transmitted but decrypted each time it passes through nodes Message is encrypted when transmitted but decrypted each time it passes through nodes More convenient in networks with many nodes More convenient in networks with many nodes Encrypts all information (headers & routing info.) Encrypts all information (headers & routing info.) Disadvantage: more points of vulnerability Disadvantage: more points of vulnerability

How it Works Keys are the basic concept of encryption Complex mathematical formulas (algorithms) Complex mathematical formulas (algorithms) Data passes through algorithms & is converted into ciphertext Keys make it difficult for individuals to crack the encrypted message

How it Works Two Key Systems: Secret Key Secret Key Both sender & receiver know secret code word This is not feasible for business transactions Fast but not as safe as public key Public Key (Asymmetric) Public Key (Asymmetric) Key pairs are used to encrypt & decrypt messages Each person has public key & private key Public key is useless without the private key

How it Works

Message Authentication: Ensures sent & received message is in exact form Ensures sent & received message is in exact form Digital Signature: Tool that provides electronic evidence that you sent a signed message Tool that provides electronic evidence that you sent a signed message

Protocols Encryption is implemented through IPsec (Internet Protocol Security) IPsec works through the network architecture SSL (Secure Sockets Layer): Public key encryption developed by Netscape Public key encryption developed by Netscape Symmetric protocol Symmetric protocol Used by Internet browsers & web servers to transmit sensitive information Used by Internet browsers & web servers to transmit sensitive information By default, browsers have 40-bit encryption By default, browsers have 40-bit encryption SSL has become part of TLS (Transport Layer Security) SSL has become part of TLS (Transport Layer Security)

Protocols Wireless Equivalent Privacy (WEP): Introduced in 1997 Introduced in 1997 Most common security protocol in older networks Most common security protocol in older networks Key lengths of 128- & 256-bit Key lengths of 128- & 256-bit Used at lowest Used at lowest layers of OSI model Weaknesses Weaknesses were identified in 2001

Protocols Wi-Fi Protected Access (WPAv1): Rolled out after WEP to provide much stronger data encryption Rolled out after WEP to provide much stronger data encryption Introduced in 2003 Introduced in 2003 All of the network devices need to be configured for WPA All of the network devices need to be configured for WPA Temporal Key Integrity Protocol (TKIP) encryption algorithm developed for WPA Temporal Key Integrity Protocol (TKIP) encryption algorithm developed for WPAWPAv2: Implements mandatory elements of i Implements mandatory elements of i Combines AES & TKIP algorithm, considered fully secure Combines AES & TKIP algorithm, considered fully secure

Wireless Encryption Cracking What is it? Breaching of wireless encryptions Breaching of wireless encryptions Types of Attacks: Decrypting traffic by tricking access points Decrypting traffic by tricking access points Gathering traffic & performing dictionary-based attacks Gathering traffic & performing dictionary-based attacks Decrypting traffic by statistical analysis Decrypting traffic by statistical analysisExamples: WEPCrack, AirCrack, AirSnort WEPCrack, AirCrack, AirSnort

Encryption Humor

Authorities / Standards Data Encryption Standard (DES): Approved in 1976 & publicized in 1977 Approved in 1976 & publicized in st major symmetric algorithm developed for PC’s 1 st major symmetric algorithm developed for PC’s Official method for protecting unclassified data Official method for protecting unclassified data Advanced Encryption Standard (AES): Adopted in 2001 by U.S. Government Adopted in 2001 by U.S. Government Uses 128-, 192-, or 256-bit keys Uses 128-, 192-, or 256-bit keys 2009, AES is the most popular algorithm used in symmetric key cryptography 2009, AES is the most popular algorithm used in symmetric key cryptography

Authorities / Standards IEEE series of standards (1997): Set of standards carrying out WLAN PC communication Set of standards carrying out WLAN PC communication : two net bit rates of 1 or 2 Mbit/s & forward error correction b: maximum raw data rate of 11 Mbit/s g: maximum physical layer bit rate of 54 Mbit/s n: new multi-streaming modulation technique; still under draft development

TheEnd