WEP Case Study Information Assurance Fall 2009. 802.11 or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Slide 1 Vitaly Shmatikov CS 378 (In)Security of b.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

WEP Case Study Information Assurance Fall 2009

or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates at the 2.4 or 5 GHz radio bands Wireless Access Point is the radio base station –The access point acts as a gateway to a wired network e.g., ethernet Laptop with wireless card uses to communicate with the Access Point

External Security Mechanisms MAC restrictions at the access point –Protects servers from unexpected clients –Unacceptable in a dynamic environment –No identity integrity. You can reprogram your card to pose as an “accepted” MAC. –No confidentiality protection IPSec or other VPN tunnel –To access point or some IPSec gateway beyond –Protects clients from wireless sniffers

Wired Equivalent Privacy (WEP) Excellent example of how security system design can go wrong. –Flaws widely published in late 2000 –Unsafe at Any Key Size. Tech. Rep. 00/ –(In)Security of the WEP algorithm. –Intercepting Mobile Communications: The Insecurity of Intercepting Mobile Communications: The Insecurity of Took secure elements and put them together poorly

RC4 Stream Cipher Takes a key value as input and generates a key stream –Key stream is XOR’ed with plaintext to create ciphertext –ci = pi  ki, for i = 1, 2, 3 –Ciphertext is XOR’ed with key stream to create plaintext, –pi = ci  ki, for i = 1, 2, 3 Knowing two of key stream, plaintext, and ciphertext lets you easily compute the third –Reusing a key value is a really, really bad idea. A well known fact for RC4

Problems reusing a key Assume you know two ciphers use the same key –C1 = P1 xor K –C2 = P2 xor K –C1 xor C2 = P1 xor P2 xor K xor K = P1 xor P2 If you have more Cx using K, get more variations of XOR plaintexts

Key Use Attack Architecture

Key Reuse Active Attacks Insert known plaintext –Send (probably forged or annonymized) to someone on the access point and sniff the stream –Knowing both plain and ciphertext getting the key stream for that key is just an XOR Sniff both the wireless stream and the wire after the access point –Correlate the two streams to get plain and ciphertext pairs

Key Reuse Passive Attacks Many packets contain well known fields at well known locations –E.g. IP header fields –Use knowledge about IP headers to get partial key recovery for all packets Analyze the plaintext xor’s directly –Knowing how plaintext streams differ can help in the analysis –Use natural language facts to determine the likely plain text

WEP’s Key Reuse RC4 40 bit seed is created by concatenating a shared secret with a 24 bit initialization vector (IV) –Frames can be lost and stream ciphers do not deal with missing bits, so the stream must be reset with each packet. –Therefore, a new IV is sent in the clear with each packet A family of 2^24 keys for each shared secret Keys are cycled for each packet

WEP’s Key Reuse IV is only 24 bits, the time to repeat IV’s (and thus keys) with high probability is very short –By birthday paradox, 50% probability of getting some IV reuse after using 4,096 IV’s. –99% likely that you get IV re-use after 12,430 frames or 1 or 2 seconds of operation at 11 Mbps. Build table of cipher text keyed by IV

No Rekeying One key used between an Access Point and all clients WEP defines no automatic means of updating the shared key –In practice folks do not frequently update WEP keys –Ideally should be changing shared key after 6 frames to keep low probability of IV collision (99.999% probability of no IV reuse)

RC4 Weak Keys RC4 has weak keys –Use of weak keys greatly aid crypto analysis –1 of 256 keys are weak –There are standard techniques to avoid the weak keys but WEP does not employee these techniques. Airsnort and wepcrack tools leverage weak keys –Weakness in the Key Scheduling Algorithm of RC4 pdf pdf

WEP CRC Problems We encrypt the CRC, so it is secure, right? Wrong. CRC is linear –Flipping bits in the ciphertext can be fixed up in the CRC even if the CRC is RC4 encrypted This means that an attacker can change the cipher text and fix up the CRC –CRC1 xor Delta = CRC2 –C = CRC1 xor K –C xor Delta = C’

Chop Chop Attack Interactively decrypt trailing bytes –Does not reveal root secret Pick off last byte, R –Make a guess of R's value and fix up encrypted CRC for shortened packet –Access Point will reject packet if guess is wrong –Keep guessing until Access Point accepts shortened packet

SSL uses RC4 Safely Over a reliable data stream so the 128 bit key does not need to be reset with each packet Would need to capture 2^64 streams rather than 2^12 streams to get key reuse with 50% probability New keys potentially change all bits not just the bottom 24 bits. Rekeying algorithm Uses strong crypto hash for MAC –HMAC-SHA and HMAC-MD5

IPSec Secures Over Unreliable Protocol Uses separate keys in each direction Uses 64 bit (for 3DES) or 128 bit (for AES) IV’s Uses the IV as a salt not as part of the key Forces a rekey after at most 2^32 packets Uses strong crypto hash for MAC –HMAC-SHA and HMAC-MD5

802.11i IEEE effort to improve security of the spec –Using 802.1X for authentication –802.1X is a general L2 protocol Wi-Fi Alliance promoting interim standards –WPA, a shorter term solution that uses existing hardware –WPA2, an implementation of the full i standard

Wi-Fi Protected Access (WPA) Interim solution to run on existing wireless hardware Uses Temporal Key Integrity Protocol (TKIP) for data encryption and confidentiality –Still uses RC4, 128 bits for encryption –Provisions for changing base keys –Avoids weak keys Includes Michael a Message Integrity Code (MIC) –64 bits –Replaces the CRC –Observer cannot create new MIC to mask changes to data Increases IV from 24 bits to 48 Mixes the IV and the base key

New Chop Chop TKIP Attack Noted on the newsgroup in early November 2008 – ng.org/breakingwepandwpa.pdfhttp://dl.aircrack- ng.org/breakingwepandwpa.pdf –Overview of WEP attacks plus a chop chop attack on TKIP Two protections against chop chop –If two MIC failures in 60 seconds, assume attack. Shutdown and renegotiate keys after 60 seconds. –Out of order packets discarded

TKIP chop chop Many installations have multiple QoS Channels. –Pick ARP packet from busy QoS Channel –Know all bytes of ARP packet except, ICV, MIC, and last byte of address –Play on less busy QoS channel to avoid packet ordering problems Once you have a good ICV but bad MIC, wait 60 seconds (avoid shutdown)

TKIP Chop Chop Final Once you have all values reverse calculate MIC key –Now attacker can generate ARP packets directly to clients of interest (whose packet counters are low enough) –Could ARP cache poison

WPA2 Uses AES, specifically Counter-Mode/CBC-MAC Protocol (CCMP) –Too computationally intensive in SW for wireless hardware deployed at the time of WEP Uses 128 bit key Provides data confidentiality by using AES in counter mode Provides message authentication using Cipher Block Chaining Message Authentication Code (CBC-MAC) –The MAC also covers the packet source and destination

802.11i Summary