Giuseppe Bianchi Warm-up example 2 802.11 WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.

Slides:



Advertisements
Similar presentations
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Wireless Security David Wagner University of California, Berkeley.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Computer Security CS 426 Lecture 3
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Submission August 2001 Nancy Cam-Winget, Atheros Slide 1 Rapid Re-keying WEP a recommended practice to improve WLAN Security Nancy Cam-Winget, Atheros.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CSC-682 Advanced Computer Security
A History of WEP The Ups and Downs of Wireless Security.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Encryption Protocols used in Wireless Networks Derrick Grooms.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Slide 1 Vitaly Shmatikov CS 378 (In)Security of b.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Protocols WEP, WPA & WPA2.
Wireless Security Ian Bodley.
Cryptography Lecture 9.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Cryptography Lecture 16.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Symmetric-Key Encryption
RC4 RC
Inaugural meeting (for Hasheem: that means ‘the first meeting’
Presentation transcript:

Giuseppe Bianchi Warm-up example WEP

Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher  And you must design GOOD protocols  WEP goals  Authentication Ridicolous! Facilitates attack!  Integrity Inconsistent!  Confidentiality Broken!  WEP: best “real world” example of how to make things incredibly (!) wrong  And well «besides» its weak cipher (RC4)

Giuseppe Bianchi Background: stream ciphers  One-time pad:  ENC(KEY,MSG) = MSG  KEY  KEY = random, one per message  Stream cipher: replace “random key” with “pseudorandom keystream”  Keystream generation  secret internal state  Very fast and easy to process with respect to block ciphers S i State function Output function (secure pseudo-random) S i+1 ks i Message i ciphertext i Secret key = key, IV Secret key controls: - initial state - state function - output function

Giuseppe Bianchi Same keystream?  No security!  (M1  ks i )  (M2  ks i ) = M1  M2  If one message known, other known  Consider active attacks »E.g. send message from the Internet to a WLAN terminal and eavesdrop its encrypted version  Limited message entropy  helps to infer  “context” information  helps to infer  Same keystream iff same (Key, IV)  {ks i } = PRNG(IV,Key)  Conclusion: if multiple IV used and same key, IVs MUST be unique  WLAN case: same pre-shared key

Giuseppe Bianchi WEP 24 bits40 bits (IV, shared key) used as RC4 seed Must never be repeated (why?) There is no key update protocol, so security relies on never repeating IV IV sent in the clear Worse: changing IV with each packet is optional! CRC-32 checksum is linear in  : if attacker flips some plaintext bits, he knows which bits of CRC to flip to produce the same checksum no integrity! Source: V. Shmatikov

Giuseppe Bianchi Per-frame IV: a must in WLAN  Stream cipher must be synchronized  BIG problem in lossy channels  WEP solution: send IV per each frame  Can independently decrypt each frame irrespective of previously received/missed ones  IV transmitted in clear  Not a problem if IV does never repeats  Keystream = PRNG(IV,Key); key unknown

Giuseppe Bianchi Repeating IV in WEP  How to generate IVs?  Left to implementation!  [never, NEVER, do this in security protocols!!]  Cyclic generation {1,2,3,…}?  24 bit  2 24 cycle = frames  Assume:1500 bytes frames,  7 mbps (net) wifi throughput  IVs re-cycle after less than 8h!  Random IV generation?  Birthday paradox!  50% collision probability after approx 2 12 = 4000 frames!  Restart after reboot?  In many cases, IV re-start from 0! Same IV sequence!!

Giuseppe Bianchi Practical attacks to small IV space  Passive attack: create dictionary IV  RC4(IV,Key)  Use known messages to recovery keystream (MSG  RC4(IV,key))  MSG = RC4(IV,key)  Known messages? Send an with large known attachment  Use…. AUTHENTICATION PROCEDURE!!  Wait for IV to repeat: game over (M’  RC4(IV,key))  RC4(IV,key) = M’  Larger WEP key size (e.g. 128)?  Irrelevant: IV still 24 bits!! Same attack time!!

Giuseppe Bianchi Why WEP “authentication” helps?  Authentication Challenge- Handshake with symmetric cipher  Prove knowledge of K by showing ability to encrypt the challenge Challenge ENC K (Challenge)

Giuseppe Bianchi Why WEP “authentication” helps?  WEP details  Same key as frame encryption (!) Challenge IV, Challenge  RC4(IV,K)

Giuseppe Bianchi Why WEP “authentication” helps?  Rogue AP: send multiple challenges  Gather multiple [IV, RC4(IV,K)] pairs!!  When enough, go and enjoy decrypting anyone else in the BSS! Challenge IV, Challenge  RC4(IV,K)

Giuseppe Bianchi “authentication”??  No need to know key  JUST one [ID, RC4(IV,K)] pair  game over!  IV chosen by… responder!!! Challenge IV, Challenge  RC4(IV,K)

Giuseppe Bianchi Why WEP “authentication” helps?  And if no IV available and no active attack possible?  Just eavesdrop ONE authentication!! Challenge IV, Challenge  RC4(IV,K) Challenge known  derive RC4(IV,K) IV in plaintext One pair ready to be used for YOUR authentication!

Giuseppe Bianchi Well, things get even worse weak chosen cipher  Cryptoanalytic attack to RC4  Fluhrer, Mantin, Shamir: show weakness  Some “weak” IVs leak key information into keystream »With 5% probability, a byte in the keystream is equal to a byte in the key »Look at many packets and see where bias is  Stubblefield, Ioannidis, Rubin use weakness  Focus on first keystream byte  BUT this is even known for ALL packets »Remember: uses SNAP LLC encapsulation: first byte = 0xAA »Known plaintext!  Attack linear (!) with key size

Giuseppe Bianchi What about integrity?  “Terrific” idea: use native CRC-32 as integrity check value  External encryption wrapping should prevent (!) attacker to perform valid alterations  Problem: CRC-32 is linear!  c(A)  c(B)=c(A  B)  Deadly : use only cryptographically strong algorithms  Consequences:  (Meaningful!) Message modification  Message injection

Giuseppe Bianchi Message modification IV; C = [M|C(M)]  RC4(IV,K) Chooses  as long as M Computes c(  ) Computes: C’ is an encrypted message with valid CRC32!! Fooled! NO NEED to know M  can be chosen so as to flip specific bits

Giuseppe Bianchi Message injection Obtain one pair IV, RC4(IV,K) Goal: inject message M so that it is authenticated and encrypted Steps: - Compute c(M) - inject IV, RC4(IV,K)  [M|c(M)) Take-home messages: 1) integrity check must be NON LINEAR 2) Integrity check must explicitly include a key external encryption may not provide ANY guarantee

Giuseppe Bianchi : Aftermath  Optimized WEP attacks on many open source  Although just very few WEP protected networks remaining  WiFi evolution (802.11i):  WPA: retain hardware compatibility (RC4), but patch with:  Longer IV (48 bit)  Protection of IV (plaintext differs from RC4 input)  Ephemeral key derivation (changing in time)  …  WPA2: as above but using AES (new hardware)