Slide 1 Vitaly Shmatikov CS 378 (In)Security of 802.11b.

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Security With a focus on Security Dr. Tulin Mangir Partially sponsored by NSF Grant No:
Wireless Security.
WLAN What is WLAN? Physical vs. Wireless LAN
How Things Goes Wrong: Misuse of Cryptography in Secure System Design
0x1A Great Papers in Computer Security
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Hacking Wireless Networks (Part II – WEP & WPA)
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Vitaly Shmatikov CS 361S Introduction to Stream Ciphers Attacks on CSS, WEP, MIFARE.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
How crypto fails in practice? CSS and WEP
RC4 RC
Presentation transcript:

slide 1 Vitaly Shmatikov CS 378 (In)Security of b

slide b Overview uStandard for wireless networks Approved by IEEE in 1999 uTwo modes: infrastructure and ad hoc IBSS (ad hoc) mode BSS (infrastructure) mode

slide 3 Access Point SSID uService Set Identifier (SSID) differentiates one access point from another By default, access point broadcasts its SSID in plaintext “beacon frames” every few seconds uDefault SSIDs are easily guessable Linksys defaults to “linksys”, Cisco to “tsunami”, etc. This gives away the fact that access point is active uAccess point settings can be changed to prevent it from announcing its presence in beacon frames and from using an easily guessable SSID But then every user must know SSID in advance

slide 4 Wired Equivalent Protocol (WEP) uSpecial-purpose protocol for b Intended to make wireless as secure as wired network uGoals: confidentiality, integrity, authentication uAssumes that a secret key is shared between access point and client uUses RC4 stream cipher seeded with 24-bit initialization vector and 40-bit key Terrible design choice for wireless environment In SSL, we will see how RC4 can be used properly

slide 5 Shared-Key Authentication beacon Prior to communicating data, access point may require client to authenticate Access PointClient association request association response probe request OR challenge challenge  RC4(IV,K) unauthenticated & unassociated authenticated & unassociated authenticated & associated Passive eavesdropper recovers RC4(IV,K), can respond to any challenge from then on without knowing K

slide 6 How WEP Works 24 bits40 bits IV | shared key used as RC4 seed Must never be repeated (why?) There is no way key update protocol in b, so security relies on never repeating IV IV sent in the clear Worse: b says that changing IV with each packet is optional! CRC-32 checksum is linear in  : if attacker flips some bit in plaintext, there is a known, plaintext-independent set of CRC bits that, if flipped, will produce the same checksum no integrity!

slide 7 Why RC4 is a Bad Choice for WEP uStream ciphers require synchronization of key streams on both ends of connection This is not suitable when packet losses are common uWEP solution: a separate seed for each packet Can decrypt a packet even if a previous packet was lost uBut number of possible seeds is not large enough! RC4 seed = 24-bit initialization vector + fixed key Assuming 1500-byte packets at 11 Mbps, 2 24 possible IVs will be exhausted in about 5 hours uSeed reuse is deadly for stream ciphers

slide 8 Recovering Keystream uGet access point to encrypt a known plaintext Send spam, access point will encrypt and forward it Get victim to send an with known content uIf attacker knows plaintext, it is easy to recover keystream from ciphertext C  M = (M  RC4(IV,key))  M = RC4(IV,key) Not a problem if this keystream is not re-used uEven if attacker doesn’t know plaintext, he can exploit regularities (plaintexts are not random) For example, IP packet structure is very regular

slide 9 Keystream Will Be Re-Used uIn WEP, repeated IV means repeated keystream uBusy network will repeat IVs often Many cards reset IV to 0 when re-booted, then increment by 1  expect re-use of low-value IVs If IVs are chosen randomly, expect repetition in O(2 12 ) due to birthday paradox (similar to hash collisions) uRecover keystream for each IV, store in a table (KnownM  RC4(IV,key))  KnownM = RC4(IV,key) Even if don’t know M, can exploit regularities uWait for IV to repeat, decrypt and enjoy plaintext (M’  RC4(IV,key))  RC4(IV,key) = M’

slide 10 It Gets Worse uMisuse of RC4 in WEP is a design flaw with no fix Longer keys do not help! –The problem is re-use of IVs, their size is fixed (24 bits) Attacks are passive and very difficult to detect uPerfect target for Fluhrer et al. attack on RC4 Attack requires known IVs of a special form WEP sends IVs in plaintext Generating IVs as counters or random numbers will produce enough “special” IVs in a matter of hours uThis results in key recovery (not just keystream) Can decrypt even ciphertexts whose IV is unique

slide 11 Do Not Do This [courtesy of Brian Lee] Ingredients: Laptop (with b card, GPS, Netstumbler, Airsnort, Ethereal) and the car of your choice uDrive around, use Netstumbler to map out active wireless networks and (using GPS) their access points uIf network is encrypted, park the car, start Airsnort, leave it be for a few hours Airsnort will passively listen to encrypted network traffic and, after 5-10 million packets, extract the encryption key uOnce the encryption key is compromised, connect to the network as if there is no encryption at all uAlternative: use Ethereal (or packet sniffer of your choice) to listen to decrypted traffic and analyze uMany networks are even less secure

slide 12 Weak Countermeasures uRun VPN on top of wireless Treat wireless as you would an insecure wired network VPNs have their own issues –Compromise of one client may compromise entire network, denial of service, piggybacking, performance problems, etc. uHide SSID of your access point Still, raw packets will reveal SSID (it is not encrypted!) uHave each access point maintain a list of network cards addresses that are allowed to connect to it Infeasible for large networks Attacker can sniff a packet from a legitimate card, then re-code (spoof) his card to use a legitimate address

slide 13 Fixing the Problem uExtensible Authentication Protocol (EAP) Developers can choose their own authentication method –Cisco EAP-LEAP (passwords), Microsoft EAP-TLS (public-key certificates), PEAP (passwords OR certificates), etc. WEP still a problem; denial of service and other attacks u802.11i standard fixes b problems Patch: TKIP. Still RC4, but encrypts IVs and establishes new shared keys for every 10 KBytes transmitted –No keystream re-use, prevents exploitation of RC4 weaknesses –Use same network card, only upgrade firmware Long-term: AES in CCMP mode, 128-bit keys, 48-bit IVs –Block cipher (in special mode) instead of stream cipher –Requires new network card hardware