130 likes | 229 Views
Wireless security & privacy. Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005), 23-25 Jan. 2005, pp. 424 – 428 Reporter: Jung-wen Lo ( 駱榮問 ) Date: 2005/7/14. Outline. Introduction
E N D
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005), 23-25 Jan. 2005, pp. 424 – 428 Reporter: Jung-wen Lo (駱榮問) Date: 2005/7/14
Outline • Introduction • WEP Format & Working of 64bits RC4 • WEP Encryption & Decryption • Weakness in WEP • Type of Attack • WEP Extensions • Appendix
Introduction • WEP (Wired Equivalent Privacy) • 802.11 optional encryption standard • Implemented in the MAC layer • Relies on RC4 • Provide • User authentication • Data privacy • Data integrity
WEP Format & Working of 64-bit RC4 ※ICV: Integrity check value = CRC32(Plain Text)
Weakness in WEP (1/2) • Key management & Key size • Key management is not specified in WEP • One single WEP key shared between every node on the network • Key size • 40 bits in standard • Vendors extend up to 104 bits • IV (Initialization Vector) is too small • Size=24 bits 16,777,216 RC4 Cipher streams • If RC4 cipher stream found, attacker can decrypt packets with same IV • IV starts from 0 in incremental order • IV chooses randomly
Weakness in WEP (2/2) • Integrity Check Value (ICV) algorithm is not appropriate • CRC32 is linear function of the message • Attacker can modify an encrypted message & easily fix the ICV • Weak of WEP using RC4 • 9000/16million weak keys • Reveal in 2000 – 4000 packets Extend WEP key to 104 bits • Authentication messages can be easily forged • 802.11 define two forms authentication • Shared key authentication: Reduce DoS attack • Open system authentication: Give better network security
Type of Attack • Passive attack • Attacker collects two same key stream cipher text packets Reveal key • Active attack to insert traffic • Attacker knows plaintext & cipher text pair Generate key stream & new cipher text • Active attack from both ends • Attacker predicts both information & destination address Modify address • Table based attack • Attacker builds a table of IVs & corresponding key stream • Dictionary building attack • Allows real time automated decryption of all traffic
WEP Extensions (1/3) • 802.1X • Entities • Supplicant (End user machine) • Authentication server • Grant or deny authentication by help of authenticator • Authenticator server • Compare credentials supplied by supplicant with information in its database • Drawbacks • No authenticity or integrity protection between access point & client
WEP Extensions (2/3) • TKIP (Temporal Key Integrity Protocol) • Components • MIC (Message Integrity Check) • Protect Header & Payload • Packet sequencing • Employ packet sequencing number and synchronization to prevent replay attack • Per packet keying • Keys have fixed lifetime and replaced frequently • Phase 1: Create intermediate key • Phase 2: Encrypt the packet sequence number by intermediate key • Re-keying • Solve the problem of re-using IVs in WEP • Three key types • Temporal keys: 128-bit for encryption and 64-bit for data integrity • Key encryption keys: protect temporal keys • Master keys: secure for communication between client and AP
WEP Extensions (3/3) • 802.11i • AES uses 128-bit temporal key & 48-bit IV in MIC calculation & encryption process • Other alternatives • VPN’s • VPN client associates to an AP the establishes an authenticated encrypted session with VPN server • SSL • Authenticate client & server via public key cryptography
Apendix 1 • TKIP • Part of a draft standard from the IEEE 802.11i working group • RSN (Robust Secure Network) • Part of 802.11i standard • Cipher Suites • Code 1: WEP • Code 2: TKIP • Code 3: WRAP (Wireless Robust Authenticated Protocol) • Code 4: CCMP (Counter mode with Cipher block chaining Message authentication code Protocol) • Code 5: WEP-104
Appendix 2 • WPA (Wi-Fi Protected Access) • 802.1x + TKIP • EAP: Extensible Authentication Protocol