CS549: Cryptography and Network Security



Similar documents
CS 356 Lecture 29 Wireless Security. Spring 2013

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

chap18.wireless Network Security

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

How To Secure Wireless Networks

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Security in IEEE WLANs

Certified Wireless Security Professional (CWSP) Course Overview

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Chapter 6 CDMA/802.11i

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Authentication in WLAN

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Configure WorkGroup Bridge on the WAP131 Access Point

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Lecture 3. WPA and i

Wireless Networks. Welcome to Wireless

Advanced Security Issues in Wireless Networks

Beyond Retail: The Imperative for Ubiquitous Security in Wireless Printers

Chapter 2 Wireless Networking Basics

WIRELESS SECURITY IN (WI-FI ) NETWORKS

WiFi Security: WEP, WPA, and WPA2

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

CSC574: Computer and Network Security

Wireless Technology Seminar

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Huawei WLAN Authentication and Encryption

Nokia E90 Communicator Using WLAN

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Cipher Suites and WEP

The next generation of knowledge and expertise Wireless Security Basics

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Wireless Security for Mobile Computers

Running Head: WIRELESS NETWORKING FOR SMALL BUSINESSES. Wireless Networking for Small Businesses. Russell Morgan. East Carolina University

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards


Concurrent 2.4 and 5 GHz Performance. Backward Compatible. Fast Roaming through 802.1X PMK Caching. Power over Ethernet Port. Secure Communications

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Configuring Security Solutions

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Security in Wireless Local Area Network

Link Layer and Network Layer Security for Wireless Networks

IEEE Wireless LAN Security Overview

Chapter 2 Configuring Your Wireless Network and Security Settings

Vulnerabilities in WEP Christopher Hoffman Cryptography

AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Wireless (Select Models Only) User Guide

Topics in Network Security

Recommended Wireless Local Area Network Architecture

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

How To Protect A Wireless Lan From A Rogue Access Point

Network Security Protocols

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

Go Wireless. Open up new possibilities for work and play

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wireless Network Standard and Guidelines

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

HP ProCurve Wireless Access Point 10ag Overview

The Importance of Wireless Security

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

P r o t o l ck w fi ma a n ger User s Guide

Distributed Systems Security

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

Your Wireless Network has No Clothes

Lecture 2 Secure Wireless LAN

WLAN and IEEE Security

Transcription:

CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1

Notice This lecture note (Cryptography and Network Security) is prepared by Xiang-Yang Li. This lecture note has benefited from numerous textbooks and online materials. Especially the Cryptography and Network Security 2 nd edition by William Stallings and the Cryptography: Theory and Practice by Douglas Stinson. You may not modify, publish, or sell, reproduce, create derivative works from, distribute, perform, display, or in any way exploit any of the content, in whole or in part, except as otherwise expressly permitted by the author. The author has used his best efforts in preparing this lecture note. The author makes no warranty of any kind, expressed or implied, with regard to the programs, protocols contained in this lecture note. The author shall not be liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or use of these. Cryptography and Network Security 2

Cryptography & Network Security Wireless LAN Security Road to 802.11i Xiangyang Li Cryptography and Network Security 3

Contents Introduction Problem: 802.11b Not Secure! Wired Equivalent Privacy WEP Types of Attacks 802.11b Proposed Solutions 802.1X Wi-Fi Protected Access (WPA) 802.11i: The Solution Conclusion Cryptography and Network Security 4

Introduction Popular in offices, homes and public spaces (airport, coffee shop) Most popular: 802.11b Example: Yahoo! DSL Wireless Kit Theoretical max @ 11Mbps Operate at 2.4GHz band DSSS/FSSS modulation similar to CDMA phones Cryptography and Network Security 5

Introduction Standards: IEEE 802.11 Series 802.11b 11Mbps @ 2.4GHz 802.11a 54Mbps @ 5.7GHz band 802.11g 54Mbps @ 2.4GHz band 802.1X security add-on 802.11i high security Cryptography and Network Security 6

Problem: 802.11b Not Secure! No inherent security Wired Wireless media change was the objective Wired Equivalent Privacy (WEP) The only security built into 802.11 Uses RC4 Stream Cipher in a bad way Vulnerable to several types of attacks Sometimes not even turned ON Cryptography and Network Security 7

Wired Equivalent Privacy WEP RC4 stream cipher Designed by Ron Rivest for RSA Security Very simple Initialization Vector (IV) Shared Key The issue is in the way RC4 is used IV (24 bits) reuse and fixed key Early versions used 40-bit key 128-bit mode effectively uses 104 bits Cryptography and Network Security 8

Wired Equivalent Privacy WEP RC4 Key Stream Encryption (source: http://mason.gmu.edu/~gharm/wireless.html) Cryptography and Network Security 9

Types of Attacks Attacks Confidentiality Integrity Availability Cryptography and Network Security 10

Types of Attacks Attacks on Confidentiality Traffic Analysis Passive Eavesdropping Very easy to do Active Eavesdropping Unauthorized Access Cryptography and Network Security 11

Types of Attacks Attacks on Confidentiality and/or Integrity Man-In-The-Middle Attacks on Integrity Session Hijacking Replay Attacks on Availability Denial of Service Cryptography and Network Security 12

802.11b Proposed Solutions Virtual Private Network Closed Network Through the use of SSID Ethernet MAC address control lists Replace RC4 with block cipher Don t reuse IV Automatic Key Assignment Cryptography and Network Security 13

802.1X: Interim Solution Port-based authentication Not specific to wireless networks Authentication servers RADIUS Client authentication EAP Cryptography and Network Security 14

802.1X Problems 802.1X still has problems Extensible Authentication Protocol (EAP) One-way authentication Attacks Man-in-Middle Session Hijacking Cryptography and Network Security 15

802.1X Proposed Solutions Per-packet authenticity and integrity Lots of overhead Authenticity and integrity of EAPOL messages Two-way authentication Cryptography and Network Security 16

Wi-Fi Protected Access (WPA) Addresses issues with WEP Key management TKIP Key expansion Message Integrity Check Software upgrade only Compatible with 802.1X Compatible with 802.11i Cryptography and Network Security 17

802.11i Finalized: June, 2004 Robust Security Network Wi-Fi Alliance: WPA2 Improvements made Authentication enhanced Key Management created Data Transfer security enhanced Cryptography and Network Security 18

802.11i - Authentication Authentication Server Two-way authentication Prevents man-in-the-middle attacks Master Key (MK) Pairwise Master Key (PMK) Cryptography and Network Security 19

802.11i Key Management Key Types Pairwise Transient Key Key Confirmation Key Key Encryption Key Group Transient Key Temporal Key Cryptography and Network Security 20

802.11i Key Management Source: http://csrc.nist.gov/wireless/s10_802.11i%20overview-jw1.pdf Cryptography and Network Security 21

802.11i Data Transfer CCMP Long term solution mandatory for 802.11i compliance WRAP TKIP Latest AES encryption Requires hardware upgrades Provided for early vendor support Carried over from WPA Cryptography and Network Security 22

802.11i Additional Enhancements Pre-authentication Roaming clients Client Validation Password-to-key mappings Random number generation Cryptography and Network Security 23

Conclusion Basic 802.11b (with WEP) Massive security holes Easily attacked 802.1X Good interim solution Allows use of existing hardware Can still be attacked Cryptography and Network Security 24

Conclusion Wi-Fi Protected Access Allows use of existing hardware Compatible with 802.1X Compatible with 802.11i 802.11i May require hardware upgrades Very secure Nothing is ever guaranteed Cryptography and Network Security 25