DOC PREVIEW
SJSU CS 265 - SECURITY

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

802.11 Security – Wired Equivalent Privacy (WEP)Agenda for the presentationIntroduction802.11 Wireless LAN – brief description802.11 Wireless LAN – brief description (cont’d) Network servicesGoals of WEPConfidentiality in WEPConfidentiality in WEP – (cont’d) WEP keys and Initialization vector (IV)Data Integrity in WEPConfidentiality and data integrity in WEPAccess Control in WLANsSecurity loopholes and attacks on WEP Attacks on shared key authenticationSecurity loopholes and attacks on WEP - (cont’d) Attacks due to keystream reuseSecurity loopholes and attacks on WEP - (cont’d) Attacks due to CRCSecurity loopholes and attacks on WEP - (cont’d) Attacks exploiting the Access PointsSlide 16Security loopholes and attacks on WEP - (cont’d) Attacks on RC4 used by WEPLessons learnt from the failure of WEPReferences802.11 Security – Wired Equivalent Privacy (WEP)ByShruthi B KrishnanAgenda for the presentationIntroduction802.11 Wireless LAN – brief descriptionGoals of WEPConfidentiality in WEPData Integrity in WEPAccess Control in WLANsSecurity loopholes and attacks on WEPLessons to be learntIntroductionHistory of wireless technologyInception of wireless networking took place at the University of Hawaii in 1971. It was called ALOHAnet.Star topology with 7 computersSpanned 4 Hawaiian islands with the central system in OahuIn 1997, world’s first WLAN standard– 802.11– was approved by IEEEWired Equivalent Privacy – security standard proposed by 802.11Has many loopholes and has been completely broken802.11 Wireless LAN – brief descriptionStationsWireless mediumAccess PointsDistribution SystemBasic Service Set (BSS)Extended Service set (ESS)Distribution systemAccess PointsWireless MediumMobile stationsMobile stations802.11 Wireless LAN – brief description (cont’d)Network servicesDistribution System servicesAssociationDisassociationReassociationStation servicesAuthenticationDeauthenticationPrivacySuccessful AuthenticationUnauthenticated andUnassociatedAuthenticated andUnassociatedAuthenticated andAssociatedSuccessful Association/ ReassociationDisassociationDeathenticationOutside the networkInside the networkGoals of WEPConfidentialityUses stream cipher RC4 for encryptionData IntegrityUses cyclic redundancy checkAccess controlShared key authenticationConfidentiality in WEPOne-time pad vs Stream ciphersPerfect randomness is compromised for practicalityRC4 algorithm used for encryption of data framesKEYPlaintextKeystreamCiphertext+IVConfidentiality in WEP – (cont’d)WEP keys and Initialization vector (IV)Shared secret keyShared among all usersChanged infrequentlyOriginal standard – 40 bit key. Later implementations used 104 bit keyWEP uses set of up to 4 keysKey distribution problemsInitialization vector24 bitsPrepended with the secret keyNeed to be random to prevent key reuse or IV collisionIV sent in clearData Integrity in WEPComputes Integrity Check Value (ICV)ICV is appended with data frame and encryptedCRC-32 algorithm usedEfficient in capturing data tamperingCryptographically insecurePlaintext ICVPlaintextCRC-32 Plaintext ICVRC4IV Keystream+ Plaintext ICVConfidentiality and data integrity in WEPIVFrame Header4 bytes3 bytespad Keyindex40 or 104 bit keyAccess Control in WLANsRequest for accessChallenge text, REncrypt R using WEPMobile station Access PointOpen System AuthenticationShared key authenticationKeystream = R1 C1Security loopholes and attacks on WEPAttacks on shared key authenticationRequest for accessChallenge text, R1Encrypt R1 using WEP (C1)Good guy Access PointRequest for accessChallenge text, R2Encrypt R2 using WEP (C2 = Keystream R2)Bad guy Access Point++Security loopholes and attacks on WEP - (cont’d)Attacks due to keystream reuseImproper IV managementIV-space is smallImplementation dependentSent in clear Recovery of plaintextsDecryption dictionary attacksIndependent of keysizeCiphertextPlaintextKeystreamCiphertext++Plaintext+PlaintextPlaintext+Security loopholes and attacks on WEP - (cont’d)Attacks due to CRCCRC is good for message authentication, but bad for securityBoth CRC checksum and RC4 are linear and can be easily manipulated CRC is unkeyedAttacker can inject messages into the system Plaintext ICVΔ+Δc+ Plaintext ICVΔ= Plaintext Plaintext = ICV ICV Δc++Security loopholes and attacks on WEP - (cont’d)Attacks exploiting the Access PointsMobile stationAccess PointChange destination addressAttackerSecurity loopholes and attacks on WEP - (cont’d)Attacks exploiting the Access PointsMobile stationAccess PointModify any Pi and Pi+16AttackerTCP ACKTCP ACKMessage with flipped bitsIntercepted ciphertext with flipped bitsAccess points can be used to monitor TCP/IP trafficRecipient send an ACK only if TCP checksum is correctTCP checksum remains unaltered if Pi ex-OR Pi+16 is 1.Security loopholes and attacks on WEP - (cont’d)Attacks on RC4 used by WEPResearch by Scott Fluhrer, Itsik Mantin and Adi Shamir First byte of plaintext has to be known. For WEP implementations, it is 0xAASet of weak keys that correspondingly reveal some part of the secret keyFormat of weak IVsFirst byte (B) can range from 0x03 to 0x07 Second byte has to be 0xFFThird byte (N) can be any known value between 0 & 255.Probability to find a byte of secret key for 60 different values of N is non-negligibleSeveral successful experiments based on this attackPopular key-recovery programs like Airsnort use this analysisLessons learnt from the failure of WEPKey shared by all users of the systemKey is changed infrequentlyNo Perfect forward secrecyManual key management Key reuse due to non-random IVsRandom IVs are not insisted uponShort IVsNo protection for replay attacksUse of unkeyed CRC instead of SHA1-HMACEncryption cipher used was weakWEP was not publicly reviewed before it became a standardWEP is insecure!!ReferencesThe Institute of Electrical and Electronics Engineers (IEEE) websitehttp://www.ieee.org802.11Wireless Networks- The Definitive GuideBy Matthew S. Gast, O’REILLY Publications.History of


View Full Document

SJSU CS 265 - SECURITY

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download SECURITY
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SECURITY and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SECURITY 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?