 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date: 2010-09-21 1.

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Encryption/Decyprtion using RC4 Vivek Ramachandran.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
1 CSCD 439/539 Wireless Networks and Security Lecture 9 WEP Fall 2007.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.
By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CSC-682 Advanced Computer Security
A History of WEP The Ups and Downs of Wireless Security.
Slide 1 Stream Ciphers uBlock ciphers generate ciphertext Ciphertext(Key,Message)=Message  Key Key must be a random bit sequence as long as message uIdea:
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Stream Cipher July 2011.
Implementing the RC4 Algorithm
Don’t Try This at Home: A Layman’s Guide to Security Vulnerabilities of the Original Standard Dmitri “Dima” Varsanofiev cooltech[AT]varsanofiev.com.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Security Technologies built into std. Presented by T.R.Santhosh.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
University of Malawi, Chancellor College
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
System Security: Cryptography Technologies CPE Operating Systems
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Module 48 (Wireless Hacking)
Cryptography CS 555 Topic 15: Stream Ciphers.
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
RC4 RC
The RC4 Algorithm Network Security.
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date:

 WEP  RC4  How to Crack WEP  Reference 2

 WEP ◦ Wired Equivalent Privacy ◦ 64 bits and 128 bits ◦ 24 bits IV(Initialization Vector) ◦ 128 bits  26 hexadecimal characters or 13 ASCII characters ◦ 64 bits  10 hexadecimal characters or 5 ASCII characters ◦ CRC  WPA ◦ Wi-Fi Protected Access 3

 Rivest Cipher 4  Designed By Ron Rivest  RSA ◦ Ron Rivest ◦ Adi Shamir ◦ Leonard Adleman  KSA and PRGA 4

 KSA ◦ Key Schedule Algorithm 5 K[] =Key Array Initialization : For i = 0 to N-1 S[i]=i j = 0 Scatter : For i = 0 to N-1 j =j + S[i] + K[ i mod L ] Swap ( S[i], S[j] )

 PRGA ◦ Pseudo Random Generation Algorithm 6 Initialization : i = 0 j = 0 Loop : i = i + 1 j = j + S[i] Swap( S[i],S[j] ) Output: S[ S[i]+S[j] ]

 Cyclic Redundancy Check ◦ Based on Binary Division ◦ Calculate Data Checksum before Transmit,and then Check the Data is the same by Checksum after Transmit 7

8

 Repeated Use the Key Stream  Small IV Value ◦ 2^24 = 1,677,216 ◦ Every 5134 Packets Happened Collision(Birthday Paradox)Birthday Paradox  IV Value is a Plain Text  Unreliable Checksum Value 9

10 WEPWPA Key64-bits or 128- bits 128-bits Encryption Algorithm RC4 IV24-bits48-bits Key Management None802.1x

 IV Collision ◦ Collecting IV Packets ◦ Find Two Same IV Packets ◦ Use SNAP Header’s First Byte and XOR Operation to Find the KeySNAP 11

12

13

14  A wireless NIC with monitor mode AP channel

15 APs Packets with IVs

16 APs IVs Target AP

17 Spending Time IVs

 WEP Encryption ◦ 64-bits  250,000 IVs  Less than 3 hours ◦ 128-bits  580,000 IVs  Less than 6 hours 18

 Scott Fluhrer, Itsik Mantin and Adi Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography 2001, pp1 – 24  戴志坤, 楊中皇, 無線網路安全技術之分析與偵測分 析系統之設計與實現,TANET 2006  黃定宇、林韓禹、鄭家明、 葉義雄, Optimized WEP Protocol, NCS

 What Probability Does Every Q(H) People Have the Same Birthday? ◦ Let Probability is 50% ( Collision Rate) ◦ Let H is equal to 365 ◦ Formula: ◦ Q(H): Back

 SubNetwork Access Protocol ◦ IEEE Defined ◦ Support the Coexistence of Multiple Standard on LLC(Logical Link Control) 21 Physical Layer MAC LLC High-Level Protocol MAC LLC High-Level Protocol Back