DOC PREVIEW
SJSU CS 265 - Presentation

This preview shows page 1-2-21-22 out of 22 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 22 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Wireless LAN SecurityAgendaBrief BackgroundWireless network componentsSecurity Challenges and SolutionsMore on WEPWEP Encryption and IntegrityWEP AuthenticationWEP – The “flawed” SolutionWEP – The “flawed” Solution (contd.)Slide 11Design ConstraintsEnhancing WLAN Security with WPASecurity Mechanisms in WPA - TKIPMore on TKIP802.1X/EAP ArchitectureWPA Modes of Operation - Pre-shared key vs. EnterpriseWPA modes of operation – Enterprise ModeWEP vs. WPAComparing WPA and 802.11iConclusionReferencesWireless LAN SecurityPresented by:Pallavi PriyadarshiniStudent ID 003503527AgendaBrief background on Wireless LANBasic security mechanisms in 802.11WEP VulnerabilitiesEnhancing wireless security with WPAComparing WEP and WPAConclusionBrief BackgroundA local area network (LAN) with no wiresSeveral Wireless LAN (WLAN) standards802.11 - 1-2 Mbps speed, 2.4Ghz band802.11b (Wi-Fi) – 11 Mbps speed, 2.4Ghz band802.11a (Wi-Fi) - 54 Mbps speed, 5Ghz band802.11g (Wi-Fi) – 54 Mbps speed, 2.4Ghz bandWireless network componentsSecurity Challenges and SolutionsChallengesBeyond any physical boundariesEncryption, Authentication and IntegrityBasic Security Mechanisms in 802.11Service Set ID (SSID) – Acts like a shared secret, but sent in clear.MAC Address Lists – Modifiable and also sent in clear. The WEP AlgorithmMore on WEPStands for Wired Equivalent PrivacyDesigned to encrypt data over radio wavesProvides 3 critical pieces of securityConfidentiality (Encryption)AuthenticationIntegrityUses RC4 encryption algorithmSymmetric key stream cipher64-bit shared RC4 keys, 40-bit WEP key, 24-bit plaintext Initialization Vector (IV)WEP Encryption and IntegrityIVSecret KeySeed PRNGXORIVCiphertextPlaintextCRC-32AlgorithmIntegrity Check valuePlaintextKeySequenceMessagePRNG – RC4 Pseudorandom number generation algorithmData payloadWEP Authentication2 levels of authentication“Open” : No authentication“Shared secret” : Station AStation BNonce NE(N, KA-B)Request for shared key auth.Authentication responseWEP – The “flawed” SolutionWeakness in key managementSingle key for all access points and client radiosStatic unless manually changedAuthentication and encryption keys are the sameShared key authentication failureNo knowledge of secret to gain network accessWEPPR=C  P (where C, P are passively recorded)AttackerAPAuthentication requestChallenge R WEPPR  RSuccessWEP – The “flawed” Solution (contd.)Weakness in EncryptionShort 24-bit IV, reuse mandatoryWeak per-packet key derivation - exposes RC4 protocol to weak key attacks. Given c1 and c2 with same IV, c1 c2= p1p2 [p1 S  p2  S], leading to statistical attacks to recover plaintextsShort 40-bit encryption schemeNo forgery protectionUsing CRC-32 checksum possible to recompute matching ICV for changed data bitsGiven C= RC4(IV, key)  <M, ICV(M)>, can find C’ that decrypts to M’=M+Δ such that C’= RC4(IV, key)  <M’, ICV(M’)>WEP – The “flawed” Solution (contd.)No protection against replaysOptional, mostly not turned on by usersDesign ConstraintsWEP patches will rely entirely on software upgradeAccess points have little spare CPU capacity for new functionsEncryption functions are hard-wired in the access pointsEnhancing WLAN Security with WPAWPA - Wireless Protected AccessStrong, standards based, interoperable security for Wi-Fi Addresses all known weaknesses of WEPSubset of forthcoming IEEE 802.11i standard Designed to run as a software upgrade on most Wi-Fi certified products.Security Mechanisms in WPA - TKIPUses TKIP (Temporal Key Integrity Protocol) Encryption.Suite of algorithms wrapping WEPAdds 4 new algorithms to WEP:1. New cryptographic message integrity code (MIC) called Michael - to defeat forgeries2. New IV sequencing discipline - to remove replay attacks3. A re-keying mechanism – to provide fresh encryption and integrity keysMore on TKIP4. A per-packet key mixing function •Phase 1 (Eliminates same key use by all links) - Combines MAC address and temporal key. Input to S-box to produce intermediate key•Phase 2 (De-correlates IVs and per-packet keys) - Packet sequence number encrypted under the intermediate key using a fiestel cipher to produce 128-bit per packet key.TKIP leverages 802.1X/EAP framework for key management802.1X/EAP ArchitectureSupplicant(wireless client)Authenticator(AP)AuthenticationServer (RADIUS)EAP-startEAP-identity requestEAP-identity responseEAP success/rejectEAP success/rejectWPA Modes of Operation - Pre-shared key vs. EnterprisePre-shared Key Mode for home/SOHO usersDoes not require authentication server“Shared Secret” or password entered manually in the AP and wireless client. WPA takes over automatically.Only the clients with matching passwords are allowed to join the network.The password automatically kicks off the TKIP encryption process.Enterprise Mode for corporate usersRequires an authentication server like RADIUSCentralized management of user credentialsWPA modes of operation – Enterprise ModeWired Network ServicesInternetAuthentication serverAccess PointWEP vs. WPAWEP WPAEncryption Flawed Fixes all WEP flaws40-bit keys 128-bit keysStatic-same keys used by everyone on networkDynamic session keys. Per-user, per-session, per-packet keysManual distributionAutomatic DistributionAuthenticationFlawed, uses WEP key itselfStrong user authentication using 802.1X and EAPComparing WPA and 802.11i802.11i802.1XKey managementCipher & Authentication negotiationTKIPAESWPAConclusionWPA is not an ideal security protocol design…However, it is a dramatic improvement in Wi-Fi security.Has not been broken (yet).Protects the original hardware investment.If hardware constraint removed, a more robust security solution possible.Such a solution is being developed based on a even stronger cryptographic cipher - Advanced Encryption Standard (AES).References[1] Bruce Potter & Bob Fleck, “802.11 Security”, O-Reilly, December 2002[2]James larocca & Ruth larocca, “802.11 Demystified”, McGraw-Hill Telecom, 2002[3]Whitepaper on Wireless LAN Security on


View Full Document

SJSU CS 265 - Presentation

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Presentation
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Presentation and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Presentation 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?