Presentation is loading. Please wait.

Presentation is loading. Please wait.

A History of WEP The Ups and Downs of Wireless Security.

Similar presentations


Presentation on theme: "A History of WEP The Ups and Downs of Wireless Security."— Presentation transcript:

1 A History of WEP The Ups and Downs of Wireless Security

2 Wireless Communication Beginnings  Early Cordless Phones and Cell Phones  Used same idea as Walkie-Talkies  Anyone with a “Scanner” could easily eavesdrop on calls  Used a Spread-Spectrum algorithm to defeat the traditional “Scanner”

3 The 802.11 Standard  Defines wireless communications protocols  802.11b, 802.11g, 802.11n common wireless network protocols  Similar to early Cell Phones and Cordless Phones at the start – no real protection  Can easily find out network names and connect to them  Invent of War Driving!

4

5 Early Security Attempts  Open Access to Networks – Solution?  Filter the “unique” MAC address of the wireless cards  Problem?  Keep a large list of EVERY network card that can have access  No real authentication or check takes place  MAC addresses can be “spoofed”

6 Introducing WEP  W.E.P. – Wired Equivalent Privacy  Introduced in September of 1999  First real attempt at securing open wireless networks  Attempted to make the network as confidential as a traditional wired network  Originally used a 40-bit security key, later expanded to 104-bits, and 232-bits

7 A Look At WEP  IV – Initialization Vector (24-bits)  Key Selected by User  Combined to create a seed to generate the keystream

8 All Secured Sir…….  RC4 is a popular cipher used in many security applications  Problem: RC4 is a stream cipher  Keystream cannot be reused or you can get back the message  24-bit IV has a 50% chance of repeating on a busy network after 5000 IVs generated  Can also capture packets an replay them: poor authentication

9 Demonstration Time

10 After WEP  WPA created to use existing hardware  Fixes many of the downfalls of WEP  Not without its own problems  Uses a password to generate keys  Dictionary attack  TKIP Algorithm used has flaws  WPA2 developed to fix WPA  Made before WPA flaw discovered


Download ppt "A History of WEP The Ups and Downs of Wireless Security."

Similar presentations


Ads by Google