13
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Confer ence on Personal Wireless Co mmunications 2005 (ICPWC 2005), 2 3-25 Jan. 2005, pp. 424 – 428 Reporter: Jung-wen Lo ( 駱駱駱 ) Date: 2005/7/14

Wireless security & privacy

  • Upload
    kailey

  • View
    37

  • Download
    0

Embed Size (px)

DESCRIPTION

Wireless security & privacy. Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005), 23-25 Jan. 2005, pp. 424 – 428 Reporter: Jung-wen Lo ( 駱榮問 ) Date: 2005/7/14. Outline. Introduction - PowerPoint PPT Presentation

Citation preview

Page 1: Wireless security & privacy

Wireless security & privacy

Authors: M. Borsc and H. ShindeSource: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005), 23-25 Jan. 2005, pp. 424 – 428Reporter: Jung-wen Lo (駱榮問 )Date: 2005/7/14

Page 2: Wireless security & privacy

2

Outline

Introduction WEP Format & Working of 64bits RC4 WEP Encryption & Decryption Weakness in WEP Type of Attack WEP Extensions Appendix

Page 3: Wireless security & privacy

3

Introduction

WEP (Wired Equivalent Privacy) 802.11 optional encryption standard Implemented in the MAC layer Relies on RC4 Provide

User authentication Data privacy Data integrity

Page 4: Wireless security & privacy

4

WEP Format & Working of 64-bit RC4

※ICV: Integrity check value = CRC32(Plain Text)

Page 5: Wireless security & privacy

5

WEP Encryption & Decryption

Page 6: Wireless security & privacy

6

Weakness in WEP (1/2)

Key management & Key size Key management is not specified in WEP

One single WEP key shared between every node on the network

Key size 40 bits in standard Vendors extend up to 104 bits

IV (Initialization Vector) is too small Size=24 bits 16,777,216 RC4 Cipher streams If RC4 cipher stream found, attacker can decrypt packets

with same IV IV starts from 0 in incremental order IV chooses randomly

Page 7: Wireless security & privacy

7

Weakness in WEP (2/2)

Integrity Check Value (ICV) algorithm is not appropriate CRC32 is linear function of the message

Attacker can modify an encrypted message & easily fix the ICV

Weak of WEP using RC4 9000/16million weak keys Reveal in 2000 – 4000 packets Extend WEP key to 1

04 bits Authentication messages can be easily forged

802.11 define two forms authentication Shared key authentication: Reduce DoS attack Open system authentication: Give better network security

Page 8: Wireless security & privacy

8

Type of Attack

Passive attack Attacker collects two same key stream cipher text packets

Reveal key Active attack to insert traffic

Attacker knows plaintext & cipher text pair Generate key stream & new cipher text

Active attack from both ends Attacker predicts both information & destination address

Modify address Table based attack

Attacker builds a table of IVs & corresponding key stream Dictionary building attack

Allows real time automated decryption of all traffic

Page 9: Wireless security & privacy

9

WEP Extensions (1/3)

802.1X Entities

Supplicant (End user machine) Authentication server

Grant or deny authentication by help of authenticator Authenticator server

Compare credentials supplied by supplicant with information in its database

Drawbacks No authenticity or integrity protection between access

point & client

Page 10: Wireless security & privacy

10

WEP Extensions (2/3) TKIP (Temporal Key Integrity Protocol)

Components MIC (Message Integrity Check)

Protect Header & Payload Packet sequencing

Employ packet sequencing number and synchronization to prevent replay attack

Per packet keying Keys have fixed lifetime and replaced frequently

Phase 1: Create intermediate key Phase 2: Encrypt the packet sequence number by intermediate key

Re-keying Solve the problem of re-using IVs in WEP Three key types

Temporal keys: 128-bit for encryption and 64-bit for data integrity Key encryption keys: protect temporal keys Master keys: secure for communication between client and AP

Page 11: Wireless security & privacy

11

WEP Extensions (3/3)

802.11i AES uses 128-bit temporal key & 48-bit IV in MIC

calculation & encryption process Other alternatives

VPN’s VPN client associates to an AP the establishes an aut

henticated encrypted session with VPN server SSL

Authenticate client & server via public key cryptography

Page 12: Wireless security & privacy

12

Apendix 1

TKIP Part of a draft standard from the IEEE 802.11i working

group

RSN (Robust Secure Network) Part of 802.11i standard Cipher Suites

Code 1: WEP Code 2: TKIP Code 3: WRAP (Wireless Robust Authenticated Protocol) Code 4: CCMP (Counter mode with Cipher block chaining

Message authentication code Protocol) Code 5: WEP-104

Page 13: Wireless security & privacy

13

Appendix 2

WPA (Wi-Fi Protected Access) 802.1x + TKIP EAP: Extensible Authentication Protocol