Security in WAP and WTSL By Yun Zhou. Overview of WAP (Wireless Application Protocol)  Proposed by the WAP Forum (Phone.com, Ericsson, Nokia, Motorola)

Slides:



Advertisements
Similar presentations
Mobile Communication MMS.
Advertisements

Cryptography and Network Security Chapter 16
Web security: SSL and TLS
Proposal for WAP-IETF co- operation on a wireless friendly TLS Tim Wright, Vodafone and chair WAP Security Group
1 Lecture 12 SSL/TLS (Secure Sockets Layer / Transport Layer Security) CIS CIS 5357 Network Security.
SMUCSE 5349/49 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Cryptography and Network Security
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Web Security (SSL / TLS)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Cryptography and Network Security Chapter 17 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
 WAP WAP  Foundation Of WAP Foundation Of WAP  Benefits… Benefits…  Architecture… Architecture…  Layers of WAP protocol stack Layers of WAP protocol.
A Survey of WAP Security Architecture Neil Daswani
Mobile Security and Payment Nour El Kadri University Of Ottawa.
"CSC8530 Distributed Systems", Summer WAP Overview Amarnath Chitti.
Cryptography and Network Security Chapter 17
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering.
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
IEEE Wireless Local Area Networks (WLAN’s).
WAP-Wireless application Protocol
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Web Security.
Wireless Application Protocol (WAP) Reference: Chapter 12, section 2, Wireless Communications and Networks, by William Stallings, Prentice Hall.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Security in WAP Sanket Naik, Ameya Varde CS590F Fall 2000.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
TECHNICAL SEMINAR Presented by :- Satya Prakash Pattnaik TECHNICAL SEMINAR By Satya Prakash Pattnaik EC Under the guidance of Mr.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
WIRELESS APPLICATION PROTOCOL Definition It is universal, open standard developed by the WAP Forum to provide mobile users of wireless phones and other.
Web Security Network Systems Security
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
Security Standards. IEEE IEEE 802 committee for LAN standards IEEE formed in 1990’s – charter to develop a protocol & transmission specifications.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
1 Secure Socket Layer Originally by Yu Yang and Lilly Wang Originally by Yu Yang and Lilly Wang Modified by T. A. Yang Modified by T. A. Yang.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Wireless Application Protocol (WAP) William Thau CSC 8560 Dr. L. Cassel.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Secure Sockets Layer (SSL)
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Mark A. Shaw CS 522 Project Presentation
CSE 4095 Transport Layer Security TLS
SSL (Secure Socket Layer)
Presentation transcript:

Security in WAP and WTSL By Yun Zhou

Overview of WAP (Wireless Application Protocol)  Proposed by the WAP Forum (Phone.com, Ericsson, Nokia, Motorola) in  A wireless communication model, similar to the ISO OSI model  An application environment for deploying wireless services regardless of different types of services, wireless bearers, and devices.  WAP provides a series of security measures  However, there are still various security loopholes in WAP.

WAP Architecture Components: WAP device (cell phone), WAP client/browser, User agent, Network operator (companies that provides bearer services), Bearer services (SMS, CDMA…), Application server

WAP Protocols Recall the ISO OSI model: WAE (Wireless Application Environment): WML, WMLScript WSP (Wireless Session Protocol) and WTP (Wireless Transaction Protocol): together provide session layer services connection oriented sessions or connectionless sessions. Reliable sessions can be resumed. WTLS (Wireless Transport Layer Security) (Optional)

Overview of WTLS  Based on TLS  Provides client-server mutual authentication, privacy, data integrity, non-repudiation  But not the same as TLS  Modifications due to  Narrow-bandwidth communication channel  Much less processing power  Much less memory  High loss ratio  Unexpected disconnections  Restrictions on exported encryption algorithms  Built on top of WDP and UDP (unreliable data transfer)  More security problems

WTLS Sub-Protocols  WTLS contains four sub-protocols:  Handshake protocol: Client and server negotiate over the security parameters to be used for later message exchanges  Alert protocol: Specifies the types of alerts and how to handle them. warning, critical, fatal Alerts can be sent by either the client or the server.  Application protocol: interface for the upper layer  Change Cipher Spec Protocol: Usually used towards the end of the handshake when the negotiation succeeds

What does the handshake specify?

Handshake Procedure Complete handshake Resume connection

How Security Functions Are Achieved  Authentication: Supports X.509v3 and X9.68 certificates, optimized sizes.  Key exchange: RSA, DH, ECC-DH (Preferable algorithm for WAP)  Bulk encryption algorithms: RC5 with 40, 56 or 128 bit keys, DES with 40 or 56 bit keys, 3DES, IDEA with 40, 56 or 128 bit keys, and ECC. (No stream ciphers) master_secret = PRF(pre_master_secret, "master secret", ClientHello.random + ServerHello.random) key_block = PRF(master_secret + expansion_label + seq_num + server_random + client_random); Keys and IVs are all generated from key_blocks. Keys are refreshed according to the negotiated frequency.  MAC algorithms: SHA-1, MD5, and SHA_XOR_40

Security Loopholes, Threats, Solutions - WAP Gateway  Decrypts and re-encrypts data – “White spot”  End-to-end security, but the ends are actually the web client and the gateway.  Solution by the network operators: Decrypts and re-encrypts only in the memory  Cannot solve the problem entirely: still uses swapfiles, hackers can do core dumps  Some companies try to completely get rid of the WAP gateway.

Deploy the Gateway in the Server’s network Decryption and re-encryption are done on the server side.

Security Loopholes, Threats, Solutions - WTLS  Has to use keys of small sizes: 40-bit DES -> 35 bits are actually used  Allows weak algorithms to be chosen  exchanges unauthorized messages or unencrypted packet fields, such as alert messages and recode_type field.  Vulnerable to viruses, Trojan horses, and worms.  Saarinen discussed a chosen plaintext data recovery attack, a datagram truncation attack, a message forgery attack, and a key-search shortcut for some exportable keys

Attack against SHA_XOR_40  SHA_XOR_40: Padded messages are divided into 5-byte blocks. All blocks are XOR’ed to get the digest.  Attack: Flip a bit in one block, flip the bit in the corresponding position in the digest  Tada! Message modification succeeds!

User Authentication vs. Device Authentication - WIM  Mobile devices are easy to lose  One British article reported that “for the first time of this century the umbrella has been overtaken as the most popular item to leave on a train — by mobile phones”.  Cannot authenticate user if the passwords and certificates are stored locally  Use WIM (Wireless Identity Module), which can be a smart card or a SIM card.  Dedicated memory  Provides user authentication  Need to keep it separately from the device. Hard to achieve.

References Arehart, C., Professional WAP, Wrox Press Ltd, Jormalainen, S., Laine, J. “Security in WTLS”, 10/1/2000. Referred on 3/24/2004], Nicolas, R., Lekkas, P. Wireless security : models, threats, and solutions. McGraw-Hill Saarinen, Markku-Juhani, “Attacks against the WAP WTLS Protocol”, 9/ [Referred on 3/24/2004], Schneier, B., Applied Cryptography, Second Edition, John Wiley & Sons, Inc, p. 758, WAP Forum, “WAP Security Group (WSG) Charter”, 6/12/2002 [Referred on 3/24/2004].