Unformatted text preview:

Wired Equivalent Privacy (WEP)AgendaIntroductionWEPWEP EncryptionWEP Encryption Cont..WEP DecryptionProblems with WEPVarious AttacksVarious Attacks cont..Solutions for improving security of Wireless LAN’sNew Standards for improving security of Wireless LAN’s802.1X : Framework for Authentication802.11iTemporal Key Integrity Protocol(TKIP)Counter Mode/CBC-MAC ProtocolConclusionWired Equivalent Privacy (WEP) Presented ByKavitha DevireddySapna ShankarAgendaIntroduction -KavithaWEPWEP EncryptionWEP DecryptionProblems with WEPVarious attacks on WEP -SapnaSolutions for improving security of Wireless LAN ConclusionIntroductionwireless network connectivity is becoming very important part of computing environments. Currently popular wireless network standard is 802.11, in this standard data is transmitted over radio waves. In this transmissions interception and tampering becomes easy to anyone with a radio.WEPWired Equivalent Privacy (WEP), a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard.LANs are more secure than WLANs.WLANs, which are over radio waves are more vulnerable to tampering. WEP provides security by encrypting data over radio waves.WEP provides confidentiality and data integrity, and protects access to the network.WEP EncryptionWEP uses a 40bit length shared secret key.Fig: WEP Encryption frameMessage CRC Keystream=RC4(IV,k)XORIVCiphertext Transmitted DataPlaintextWEP Encryption Cont..First message data frame is checksummed, c(M). plaintext(p) = message(M) + Checksum message(c(M))Keystream = RC4(IV, k). Here k is shared key.ciphertext = plaintext XOR KeystreamThe cipher text and the initialization vector (IV) are then transmitted via radio.WEP DecryptionDecryption is reverse of encryption.First receiver recreates the keystream, Keystream = RC4(IV, k). Plaintext = Ciphertext XOR Keystream This plain text is then divided into Message and checksum.Checksum is then computed for the message and compared with the received checksum. If (Original checksum != Computed checksum), then the message has been changed during transmission.Problems with WEPKey management: WEP standard lacks good Key management that leads to poor quality.IV reuse: WEP's IV size is 24 bits.WEP uses the same IV for different data packets. An attacker can decrypt packets that were encrypted with the same IV.Inappropriate Integrity check: MD5 or SHA-1 algorithms are more suitable for cryptographic hash than CRC-32.Various Attackspassively attacking to decrypt traffic. all wireless traffic can be intercepted by a passive intruder, until an IV collision occurs. he can recover all the messages with same IV after recovering the entire plaintext for one of the messages. actively attacking to inject traffic. If the attacker knows plaintext of one encrypted message, he can change the plaintext to the new message by calculating CRC-32 and doing bit flips on the original encrypted message. If the attacker sends the new packet to the access point, it will be accepted.Various Attacks cont..actively attacking from both ends. If the attacker guesses the headers of a packet, which includes destination IP address, he can flip relevant bits to make the destination system to send the packet to his own system and transmit it using some mobile station. attacking using table of appropriate initialization vectors. Here the attacker can build table of IVs, if he knows the plaintext for some packets. Once he builds this table, he can decrypt all packets that are sent over the wireless link.Solutions for improving security of Wireless LAN’sMultiple Security measures along with WEP.Using VPN.Using Efficient key management techniques as an additional measure.Using alternative encryption techniques like IPsec instead of WEP.New Standards for improving security of Wireless LAN’s802.1X802.11i802.1X : Framework for Authentication802.1x is an open standard framework for authenticating wireless stations.Authenticates the wireless stations with an authentication server via an access point.EAP(Extensible Authentication Protocol )is used for message exchange to manage mutual authentication.Dynamic distribution of encryption keys.802.11iStandard is a solution to current security problems of WLAN’s.802.11i has two sections 802.1x section provides authentication and key management for stations.The second section, 802.11i, defines two data privacy protocols.Temporal Key Integrity Protocol(TKIP)Counter Mode/CBC MAC Protocol(CCMP)Temporal Key Integrity Protocol(TKIP)It is data encryption algorithm,provided for backward compatibility with devices using WEP and it is optional to implement.TKIP resolves the key reuse in WEP by providing 128 bit “temporal key” in a dynamic way for securing data.It uses the same RC4 algorithm as WEP does and it is not considered as a long term solution.Counter Mode/CBC-MAC ProtocolIt is mandatory for all devices implementing 802.11i standard.Is an encryption algorithm based on AES.Counter Mode provides confidentiality, integrity and protection against replay attacks.CBC-MAC(Cipher Block Chaining message authentication code) provides authentication.ConclusionWEP does little to secure the WLAN’s from attackers.Better to use WEP rather than not using any encryption.New standards and specifications which will replace WEP can be expected to provide sufficient security for wireless


View Full Document

SJSU CS 265 - Wired Equivalent Privacy

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Wired Equivalent Privacy
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wired Equivalent Privacy and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wired Equivalent Privacy 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?