Wireless Security: Token, WEP, Cellular
|
|
|
- Octavia Davidson
- 10 years ago
- Views:
Transcription
1 Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1
2 Topics for Today Security Tokens and Wireless Wired Equivalent Privacy (WEP) Cellular Network Security Intro Sources: WEP: Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: The Insecurity of In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, MobiCom '01. Scott R. Fluhrer, Itsik Mantin, and Adi Shamir. Weaknesses in the key scheduling algorithm of RC4. In Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, SAC '01. Karen Scarfone, Derrick Dicoi, Matthew Sexton, and Cyrus Tibbs. Guide to securing legacy IEEE wireless networks. Recommendations of the National Institute of Standards and Technology NIST Special Publication Revision 1, National Institute of Standards and Technology, Gaithersburg, MD, July May 2015 SE 425: Communication and Information Security 2
3 Smart Cards About the same size as magnetic stripe cards Small microchip, memory Can run programs Java Encryption Decryption Most have contacts Some are contactless (RFID) Tamper resistant More secure than magnetic stripe cards They may contain secrets Encryption keys Commonly used for High security banks High security operations Payment (NDS pay tv) 20 May 2015 SE 425: Communication and Information Security 3
4 Security Tokens Small devices that generate a sequence of random numbers from a secret seed. Synchronized with the remote location when the token is assigned to a user Often requires a pin or other password for local authentication since it can be stolen or lost! 20 May 2015 SE 425: Communication and Information Security 4
5 Uses of Tokens: Keyless Entry Reference: Francillon, et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS 2011) 20 May 2015 SE 425: Communication and Information Security 5
6 PKES Details 1. Car sends beacon messages using low frequency signals (LF short range) May be sent only when the handle opens 2. Key responds to challenge over high frequency (UHF longer range) 3. Where is key? Outside doors? Car opens door Inside car? Car turns on ignition Reference: Francillon, et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS 2011) 20 May 2015 SE 425: Communication and Information Security 6
7 Hacking car tokens Break Cryptography Intercept messages sent Figure out key/secret Physical key with RFID tag? Use fake key for entry atch?v=eu79c7ka_ea Passive key? Just a radio Signal Amplification Amplify the car s beacon signal to excite the key Key responds over UHF (up to 100m) Details: pdf 20 May 2015 SE 425: Communication and Information Security 7
8 PKES Setup Reference: Francillon, et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS 2011) 20 May 2015 SE 425: Communication and Information Security 8
9 E-Commerce Signatures Digital signatures for verifying transactions Token replacement for smart card Token can perform encryption/digital signatures Can add biometric id Software communicates with token via USB Example: Algorithmic Research Minikey 5 (2005): AES, DES, SHA1, RSA (up to 2048 bits), ECB, CBC, OFB Encrypts and authenticates ryptokit-developers-guide.pdf 20 May 2015 SE 425: Communication and Information Security 9
10 Using Tokens Best used in combination with Something you know Shows intent and prevents passive attacks Token theft? Token misuse? Commonly found in Two Factor Authentication schemes Use of smartphones for Something you have : SMS, one time codes, location (?) 20 May 2015 SE 425: Communication and Information Security 10
11 So Far Security Tokens and Wireless Wired Equivalent Privacy (WEP) Cellular Network Security Intro 27 May 2015 SE 425: Communication and Information Security 11
12 LAN Architecture Internet Wireless host communicates with base station Base station = access point (AP) BSS 1 AP hub, switch or router Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: Wireless hosts Access point (AP): base station AP Security Assumption: Shared key k known to AP and nodes Support up to 4 keys per AP BSS 2 27 May 2015 SE 425: Communication and Information Security 12
13 Security Goals of Wireless Internet Confidentiality: Prevent data sent over network from being read by others BSS 1 AP hub, switch or router AP Access Control: Ensure only packets sent by authorized nodes are sent by the AP BSS 2 Data Integrity: Prevent tampering with transmitted messages 27 May 2015 SE 425: Communication and Information Security 13
14 WEP Encryption Functions 1. Checksum (CRC32): Message M CRC32 remainder c(m) Plaintext P = M, c M 2. Encryption with RC4: Choose IV v Concatenate v with shared secret key k Use RC4 to generate keystream RC4 v, k Encrypt using XOR: C = P RC4(v, k) 3. Transmission: Send v, C over link 27 May 2015 SE 425: Communication and Information Security 14
15 WEP Decryption Functions 1. Receive v, C 2. Decryption with RC4: Separate v, C Concatenate v with shared secret key k Use RC4 to generate keystream RC4 v, k Decrypt using XOR: C RC4 v, k P RC4 v, k RC4 v, k = P 3. Check CRC: Extract M, c M Check that CRC32( M, c M = 0 27 May 2015 SE 425: Communication and Information Security 15
16 WEP Encryption Overview 27 May 2015 SE 425: Communication and Information Security 16
17 WEP Authentication Open System No authentication used Auth is a no op 1. Client requests authentication 2. AP says OK 3. Client connects to network Shared Key 1. Client requests authentication 2. AP sends challenge 3. Client encrypts with shared key and returns 4. AP verifies response and ACKs 27 May 2015 SE 425: Communication and Information Security 17
18 WEP Encryption Details Encryption uses RC4 stream cipher Invented by Ron Rivest (of RSA fame) Accepts multiple length keys Most commonly used stream cipher (SSL uses it) Has know biases and weaknesses, but not broken Encryption key length: Original version: 40b (due to US export restrictions) Newer versions: 104b or longer (232b) (after US lifted relaxed restrictions in 1996 and 2000) Key commonly specified in hexademical characters Some routers use just ASCII characters Initialization Vector length: 24b (fixed in standard) Should be chosen randomly, but standard doesn t specify how 27 May 2015 SE 425: Communication and Information Security 18
19 WEP Analysis Key Strength 40b isn t too big DES was 56b and still crackable in 24 hours Brute forcing the key isn t too hard Solution: Bigger key 104b or 232b is big Problem: Key strength isn t the only issue Stream Cipher Use Stream ciphers generate random bits and XOR over them Same bits on two messages is a bad idea C 1 = P 1 RC4 v, k C 2 = P 2 RC4(v, k) C 1 C 2 = P 1 RC4 v, k P 2 RC4 v, k = P 1 P 2 Knowing one plaintext (ex. IP header) lets you know the others The more C n you have, the easier it is 27 May 2015 SE 425: Communication and Information Security 19
20 WEP IV Management WEP designers knew this, so each packet gets its own key (k v) With 24b IV, each 2 24 = 16,777,216 different versions of the key Problems: Some wireless cards reset IV to 0 when installed and just increment Old PCMCIA wireless cards would reset on insert When does IV wrap? AP with 1500B packets and 5Mbps bandwidth 5 106b s b p = p s and 16,777,216 p p s 40,265s hours Birthday paradox: after 16,777,216 = 4096 duplicates likely IV is sent with message, so attacker can easily find duplicates 27 May 2015 SE 425: Communication and Information Security 20
21 Duplicate Found Now What? You have P 1 P 2 Do you know one of them? Login structures (field names) IP headers or TCP headers predictable Send spam which you know Some APs send broadcasts both encrypted and un-encrypted, so send a broadcast to it and watch Eventually: Can build a decryption library for the AP Key doesn t change often Just focus on first few thousand IV is space is an issue 27 May 2015 SE 425: Communication and Information Security 21
22 Authentication Problems Message Modification CRC not designed for security c x y = c x c(y) 1. Grab a message C = RC4 v, k M, c M 2. Make some changes Δ that you want to change in M 3. Calculate c(δ) 4. XOR both sides of C C = C Δ, c Δ 5. Now C decrypts to M = M Δ Attacker doesn t need to know M, but can choose the modification Message Injection Attacker gets a known plaintext P and ciphertext C pair IV reuse perhaps Attacker can extract: P C = P P RC4 v, k = RC4(v, k) Attacker can encrypt with RC4(v, k) as desired IV reuse is allowed by spec 27 May 2015 SE 425: Communication and Information Security 22
23 Authentication Problems Attacker watches for shared key authentication Gets challenge Gets response Can calculate keystream Attacker can now respond to any challenge 27 May 2015 SE 425: Communication and Information Security 23
24 Lazy Message Decryption Decryption too much work? Make the AP do it 1. Grab an encrypted WEP packet 2. Modify the Destination field in the IP header plus CRC IP checksum can be defeated Need to guess the destination IP address Compensate by changing other IP header fields to match checksum ones-complement math Choose a target IP which is the same as the destination IP with respect to ones-complement math 3. AP will decrypt and send packet to target Can also use TCP reaction attack Change one bit at a time and watch if recipient accepts it Checksum tells one bit of information per attempt 27 May 2015 SE 425: Communication and Information Security 24
25 WEP Summary Designed to be weak key (40b), but is weak in almost every way Increasing key size doesn t help Classic failure: Network standards people didn t ask cryptography community for input Stream cipher misused IV misused CRC and checksum misused Newer standards (WPA2) are better 27 May 2015 SE 425: Communication and Information Security 25
26 So Far Security Tokens and Wireless Wired Equivalent Privacy (WEP) Cellular Network Security Intro 27 May 2015 SE 425: Communication and Information Security 26
27 Cellular Network Architecture Cellular phone Mobile Station (MS) Mobile Equipment (ME) Terminal Equipment (TE) Subscriber Identity Module (SIM) Card USIM card for 3G Antenna Cell, Node B, Basic Service Set (BSS) Home Location: Who you pay your bill to Long term contract Shared secret Visitor Location: Where you are right now Roaming agreement with home Gives you service now You don t trust them, but they want to bill you Mobile Switching Center: Routes calls Serving GPRS Node: Packet Switching 27 May 2015 SE 425: Communication and Information Security 27
28 UMTS Architecture 27 May 2015 SE 425: Communication and Information Security 28
29 GSM Lessons Security lessons learned from GSM & 2.75G: Weak Cryptography Eavesdropping attacks One-way authentication Man in the Middle Attacks Attacker can trick the phone and network to stop encrypting or to use a weak cipher Denial of Service attacks Jamming Core (SS7) vulnerabilities Caller ID spoofing IMSI catchers Listen for International Mobile Subscriber Identity (IMSI) numbers which let you track phones (privacy) 27 May 2015 SE 425: Communication and Information Security 29
30 Conclusion Security Tokens and Wireless Wired Equivalent Privacy (WEP) Cellular Network Security Intro 27 May 2015 SE 425: Communication and Information Security 30
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
WLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Vulnerabilities of Wireless Security protocols (WEP and WPA2)
Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
Tutorial 3. June 8, 2015
Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. E-mail: [email protected] Dez 2009. Dez 2009 1
SSI Commons Wireless Protocols WEP and WPA2 Bertil Maria Pires Marques E-mail: [email protected] Dez 2009 Dez 2009 1 WEP -Wired Equivalent Privacy WEPisasecurityprotocol,specifiedintheIEEEWireless Fidelity
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Distributed Systems Security
Distributed Systems Security Protocols (Physical/Data-Link Layer) Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Overview Security on
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
A Security Analysis of the Wireless Networks (IEEE 802.11)
A Security Analysis of the Wireless Networks (IEEE 802.11) Sampath Thodupunuri Abstract The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
WPA Migration Mode: WEP is back to haunt you...
WPA Migration Mode: WEP is back to haunt you... Leandro Meiners (lmeiners@coresecurity / [email protected]) Diego Sor ([email protected] / [email protected]) July 2010 Abstract Cisco access points
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Lecture 2 Secure Wireless LAN
Lecture 2 Secure Wireless LAN Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Acknowledgements Part of the slides are based
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
CSci 530 Midterm Exam. Fall 2012
CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: [email protected] Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
Security in Wireless and Mobile Networks
Security in Wireless and Mobile Networks 1 Introduction This is a vast and active field, a course by itself Many references on wireless security A good book on wireless cooperation: Thwarting Malicious
WiFi Security: WEP, WPA, and WPA2
WiFi Security: WEP, WPA, and WPA2 - security requirements in wireless networks - WiFi primer - WEP and its flaws - 802.11i - WPA and WPA2 (RSN) Why security is more of a concern in wireless? no inherent
Network Security. Network Security. Security in Computer Networks
Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security
Group Number: Member Names: Date Assigned: March 23, 2004 Date Due: March 30, 2004 Last Revised: March 22, 2004 ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security Goal: The goal of this lab
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Wireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
