WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless security. Any station within range of the RF receives data Two security mechanism

Chapter 6 CDMA/802.11i

Security in IEEE WLANs

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS 356 Lecture 29 Wireless Security. Spring 2013

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wireless Networks. Welcome to Wireless

Advanced Security Issues in Wireless Networks

How To Secure Wireless Networks

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

IEEE Wireless LAN Security Overview

CS549: Cryptography and Network Security

WIRELESS NETWORK SECURITY

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

WiFi Security: WEP, WPA, and WPA2

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary

CSC574: Computer and Network Security

Wireless Local Area Network Security Obscurity Through Security

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Chapter 2 Wireless Networking Basics

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

WEP WPA WPS :: INDEX : Introduction :

2. WLAN SECURITY MECHANISMS AND PROTOCOLS 1. INTRODUCTION

Lecture 2 Secure Wireless LAN

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Distributed Systems Security

chap18.wireless Network Security

Wireless Encryption Protection

Linux Access Point and IPSec Bridge

WPA Migration Mode: WEP is back to haunt you...

MITM Man in the Middle

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

The Importance of Wireless Security

WHITE PAPER. WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Technology Seminar

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Cryptanalysis of IEEE i TKIP

Certified Wireless Security Professional (CWSP) Course Overview

Wireless LAN Security Mechanisms

Basic Security. Security Service. Authentication. Privacy. Authentication. Data privacy & Data integrity

Wireless Security with Cyberoam

The next generation of knowledge and expertise Wireless Security Basics

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Tutorial 3. June 8, 2015

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Key Management (Distribution and Certification) (1)

Lecture 3. WPA and i

Authentication in WLAN

Vulnerabilities in WEP Christopher Hoffman Cryptography

Attacks against the WiFi protocols WEP and WPA

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

WEP WPA WPS :: INDEX : Introduction :

Wireless LAN Security I: WEP Overview and Tools

The Basics of Wireless Local Area Networks

WLAN Authentication and Data Privacy

WIRELESS SECURITY IN (WI-FI ) NETWORKS

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Security in Wireless and Mobile Networks

Wireless Security: Token, WEP, Cellular

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

New Avatars of Honeypot Attacks on WiFi Networks

Building secure wireless access point based on certificate authentication and firewall captive portal

Transcription:

WLAN Security

WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will authenticate always) and encryption mechanisms Now deprecated Shared key authentication

WEP Overview 2/2 WEP algorithms (between client and AP): RC4 stream cipher for encryption purpouses WEP-40: 40 bit key + 24 bit of IV (changed on every pkt and sended in clear) WEP-128: uses a 128 bit key (Vendor s de facto standard) CRC-32 as Integrity Check (IC) value

WEP Weakness Key management Not specified Key long-lived and of poor quality (e.g. use of single key) and size In 1997 40-bit keys were considered reasonables, but now Initialization Vector (IV) too small IV reuse is a problematic issue: incremental or random Integrity Check Value (ICV) not appropriate Weak use of RC4 algorithm Fluhrer attack, weak keys Authentication messages can be easily forged

IV based weakness WEP s IV size: 24 bits. About over 16 millions of keystreams per key, but the reuse of an IV make easy to found a keystream Starting from 0 and increasing IV for each pkt IV randomly choose: 50% chance of reuse after less 5000 pkts Having a keystream, you don t know the WEP key to decrypt pkts with the same IV: C 1 XOR C 2 = P 1 XOR P 2 Having a keystream is trivial E.g. by sending on wlan a known pkt

FMS attack 1/2 FMS: Fluhrer - Mantin - Shamir Statistical passive attack that aims the reconstruction of the WEP secret key from a number of collected encrypted messages An attacker knowing the mth byte of the keystream can derive the (m+1)th byte due to a weakness in the PRNG used to generate the keystream

FMS attack 2/2 FMS: Fluhrer - Mantin - Shamir Fluhrer, Mantin and Shamir found a class of RC4 keys called weak keys (due to weak IV) IV weak : (A+3, N-1, X) If the first 2 bytes of enough key stream are known -> The RC4 key is discovered with a chance of 5% analysing 1 IV observing 60 IV the probability to found the WEP key is 50% Most of WEP cracking tools implement this attack Recovers key after 20,000 packets = 11 seconds REFERENCES: S.Fluhrer, I.Mantin, A.Shamir, Weakness in the key scheduling algorithm of RC4

WEP cracking AIRCRACK-NG 1 : set of tools used to attack a WEP-protected WLAN Airmon-ng: activate monitor mode Airodump-ng: capture and save 802.11 frames Aircrack-ng: cracking a WEP key Aireplay-ng: packet injection 1 http://aircrack-ng.org/

WPA: Wireless Protected Access Subset of standard IEEE 802.11i (also known as WPA2) Solution created to substitute WEP and intended as intermediate security platform Between WEP and 802.11i formalization Hardware backward compatibility Designed to be used with 802.1X authentication server (WPA Enterprise) Distributes different keys to each user Can be used in less secure pre-shared key (PSK) mode (WPA Personal) Weakness of WPA Data encrypted with RC4 with 128 bit key 48 bit IV

WPA improvements Temporal Key Integrity Protocol (TKIP) Major improvement over WEP (Modification of WEP protocol, but not substitution) Dynamically changes key as system is used (Per-packet Key) Combined with larger IV, this defeats well known attacks Improved payload integrity vs. WEP Uses more secure message integrity check (MIC) known as Michael, designed as a compromise between security and backward compatibility with WEP HW

WPA weakness and cracking Fundamentally much harder to crack than WEP Weakness still lies in the key: WPA-PSK Possible to passively intercept initial authentication messages then use an offline dictionary attack to find password Could allow DoS attacks (De-authentication) Counter-measure: use of strong password (e.g. Alice APs) Use of Aicrack-NG tools Use of Aicrack-NG tools intercept handshake cracking PSK de-authenticate clients

IEEE 802.11i Features Introduces fundamental changes as separating user authentication from enforcing message integrity and privacy, thus providing a robust and scalable security architecture Robust Security Network (RSN): use of 802.1X auth, robust key distribution, new integrity and privacy mechanisms Backward compatibility: Transitional Security Network, both RSN and WEP systems can participate ( remember WPA) Communication Context Agreeing on the security policy: PSK/802.1X, TKIP/CCMP 802.1X Authentication Key hiearchy and distribuition Data confidentiality and integrity

WPA2 Algorithms CCMP: Counter-Mode / Cipher Block Message Uses Advanced Encryption Standard algorithm (AES) Variable key sizes of 128, 192 and 256 bits Much harder to decrypt than WPA or WEP Not compatible with legacy devices Requires new chip sets REFERENCES: Hackin9, Wi-Fi security WEP, WPA and WPA2, 6/2005

802.1X Authentication The IEEE 802.1X authentication protocol (also known as Port-Based Network Access Control) is a framework originally developed for wired networks, providing Authentication, authorisation, key distribution and access control. Entities: supplicant joining the network Authenticator providing access control Authenticator server making authorization decisions Physical port divided into two logical ports making ud the PAE (Port Access Entity)

802.1X and WLAN Physical port -> logical association Supplicant and authenticator (AP) communicate using an EAP-based protocol At the end both entities (i.e. supplicant and auth server) have a secret master key