WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Security Technologies built into std. Presented by T.R.Santhosh.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Security Issues with Wireless Protocols
Presentation transcript:

WEP AND WPA by Kunmun Garabadu

Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication hub so that a wireless device can gain access to a cabled network.  Client  Router  Ethernet Cabling

Wireless Network Security vs Wired Network Security Wireless Security Protocols Wired Equivalent Privacy (WEP) Wi-fi Protected Access (WPA)

Why WEP ? WEP implements part of the IEEE standards.It was designed to protect networks from eavesdropping. Another function is to prevent unauthorised access to the network. It operates at the data-link and physical layers. It does not provide end-to-end security. It uses RC4 encryption which is a symmetric stream cipher to provide confidentiality It uses 64 bit or128 bit key encryption. It uses a 24 bit initialisation vector (IV)which is randomly generated. It is used to augment the shared secret key and produce a different keystream for each packet. It uses a CRC-32 checksum for data integrity check and this is part of the encrypted payload.

Encryption is performed at the Access Point (AP) as follows : The Integrated Check Value(ICV) is computed The encryption key is selected The Initialisation Vector ( IV) is generated using a pseudo random generator The IV is appended to the key and the keystream is generated The ICV is concated with the payload and then XORed with the generated key stream. AP sends the IV,key number and cipher text to the client

Encryption Process

Decryption at the client : Uses key number to get private key Uses the sent IV to generate key stream XORs the text that was received with the key stream Computes ICV on payload If the new ICV matches the sent ICV the packet is authenticated

Decryption Process

WEP’s vulnerabilities Short and static key : Actual keyspace is 40 bits or 104 bits No easy way to exchange and distribute keys.Key change involves manually changing the key on each AP and Client. Simple ASCII key strings are used as keys. Easy to crack by hackers. IV is sent out in clear text usually at the starting of the packet. IV collision. If the IV appears twice(assuming it is used with the same cipher key) it is known as a collision. Keystream is repeated every 2 ^ 24 times. This could be intercepted in a very short period of time on high traffic wireless networks.An attacker can then recover the plaintext.

No mutual authentication. Client does not authenticate the access point. Opens up the possibility for man-in-the-middle type attack. CRC-32 is linear. If the message is manipulated the checksum can also be manipulated by a malicious user Table Attack : Significant amount of traffic can be generated.A table of keystream/IV pairs can be created. The keystream can be obtained by doing xor of the plain text with the cipher text. This does not generate the key but can get decrypted data as long as IV/key stream pair exists for each packet

Passive Attack to Decrypt Traffic : A passive eavesdropper can snoop all packets till an IV collision occurs. Two packets having same IV can be xored to obtain the xor of the two plain-text messages. This XOR can be used to infer the contents of the packet. IP traffic is sometimes quite redundant. Educated guesses can be made to statistically reduce the possibilities of messages Sometimes is possible to get to the exact messages. Active Attack to Inject Traffic : An attacker who gets to know the exact plain text of one encrypted message correctly can use it to construct another encrypted message. RC4(X) xor X xor Y = RC4(Y). The attacker flips bits in the encrypted message to change the contents,adjusts the CRC and sends it to the destination

WEP provides minimum level of security in small network environments Active Attack to change Header: An attacker can get to the contents of the header especially the IP destination. Can change IP address to a machine he controls. The port address also can be changed.

WPA : Wi-fi Protected Access Why WPA ? It was created to patch the security issues of WEP

WPA implements a subset of i standards. It was started as a temporary measure to replace WEP while i got fully prepared It uses Temporal Key Integrity Protocol (TKIP) which provides for key changing dynamically. It replaces WEP without having the need to replace legacy hardware.It encrypts every`data packet with a unique key.It hashes the IV and the IV goes out encrypted.It is defined in i spec It uses RC4 stream cipher with a 128 bit key and a 48 bit IV The longer key and IV together defeat the key recovery attacks on WEP It can work with pre-shared keys as well as use x authentication

By increasing the key size, number of keys and by providing a more secure message verification system WPA adds security to a wireless network. WPA can be used for providing more robust security in corporate environments It uses a solution called Michael, which is a Message Integrity Check (MIC), to thwart the checksum being corrupted issue, It uses a 32 bit Integrity Check Value(ICV).This is inserted after payload and before IV. The MIC includes a frame counter which helps to prevent replay attacks WPA2 is the implementation of IEEE i. It implements all mandatory features specified in the standard