Encryption Protocols used in Wireless Networks Derrick Grooms.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study Nick Petroni Jr., William Arbaugh University of Maryland Presented by: Abe Murray.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CSC-682 Advanced Computer Security
A History of WEP The Ups and Downs of Wireless Security.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Implementing the RC4 Algorithm
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Security Technologies built into std. Presented by T.R.Santhosh.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
An Inductive Chosen Plaintext Attack against WEP/WEP2
Security Issues with Wireless Protocols
IT4833/6833 WiFi Security Building Blocks (I).
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

Encryption Protocols used in Wireless Networks Derrick Grooms

Introduction  WEP  WPA  WP2

History - WEP  Wired Equivalent Privacy (WEP) –WEP was part of the IEEE standard ratified in September 1999 –Initially used a 40 bit key (for 64 bit protocol), later increased to 104 bit (for 128 bit protocol) when initial restraints on cryptography were lessened by congress  Susceptible to eavesdropping, related-key, and key guessing attacks

WEP - implementation  WEP uses the stream cipher RC4 for confidentiality and the CRC-32 checksum for integrity. –RC4 – user provides a key, the key is used to create a pseudo-random string of bits that are then XOR’d with plaintext for the cipher text –CRC-32 (cyclic redundancy check ) – same system used for DVDs and CDs In general terms, a mathematical formula is created for a specific stream of text and appended to the string, after the text arrives the append is compared to a second calculation based on the text that arrived

WEP – implementation (cont.)  WEP is sound in theory but fails due to implementation –WEP fails because it uses IVs (initialization vectors) to generate uniquely different streams using the same RC4 encryption key –WEP’s IVs were not long enough to generate unique streams so every 5000 transmissions the same IV was used and with enough collected IV’s the RC4 key could be determined –IV is only 48 bits

WEP – implementation (cont.)  Cracking process –Once you have 2 messages that use the same IV you then have 2 cipher texts that can be XOR’d together to produce the same result that you would get by XORing the two plaintexts

WEP – implementation (cont.)  Cracking process –By providing your own plaintext and using the XOR’d result of the two cipher text’s you can then derive the unknown plain text

WEP – implementation (cont.)  Cracking process – brute force –Once the stream key is known it’s just a matter of sending stream key encrypted messages to an access point using different WEP keys until the access acknowledges you’ve used a successful WEP key

WEP – implementation (cont.)  Cracking process –Since it’s not possible to provide your own plaintext and receive a cipher text version without having access to the host computer, most programs use a slightly modified process to achieve the same result –RFC 1042 (SNAP headers), all IP and ARP packets always start with 0xAA, so the first few bytes of plaintext are almost always known, by collecting enough cipher text derived from the known plaintext, the stream key can eventually be determined (airsnort, WEPcrack, etc. use this method)

WPA - implementation  WPA was created as a temporary fix for WEP until WPA2 was fully developed  Uses 128 bit RC4 encryption key, and 48 bit IV, like WEP  Unlike WEP it addressed repeating IV’s by only a portion of the IV key to be sent  Also implemented a packet counter to insure the same packet could not be sent an unreasonable amount of times  Dynamic keying – WPA encryption keys update once in about every 10,000 packets  Not always compatible with older technology

WPA2 - implementation  Wi-Fi Protected Access (WPA) –Implements full IEEE i standard –Standard in wi-fi certified devices as of March 13, 2006 –Not compatible with older technology, but the new standard –Currently believed to be un-crackable

Questions?