Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2



Similar documents
Chapter 6 CDMA/802.11i

Wireless security. Any station within range of the RF receives data Two security mechanism

CS 356 Lecture 29 Wireless Security. Spring 2013

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

WiFi Security: WEP, WPA, and WPA2

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Netzwerksicherheit: Anwendungen

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

CS549: Cryptography and Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Wireless Local Area Network Security Obscurity Through Security

WIRELESS LAN SECURITY FUNDAMENTALS

Lecture 3. WPA and i

WIRELESS SECURITY IN (WI-FI ) NETWORKS

chap18.wireless Network Security

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

IEEE Wireless LAN Security Overview

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

The following chart provides the breakdown of exam as to the weight of each section of the exam.

CSC574: Computer and Network Security

Chapter 2 Wireless Networking Basics

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Distributed Systems Security

Computer Networks. Secure Systems

Wireless Pre-Shared Key Cracking (WPA, WPA2)

Security in IEEE WLANs

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

The Importance of Wireless Security

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Authentication in WLAN

Network Security Protocols

WLAN w Technology

Advanced Security Issues in Wireless Networks

The next generation of knowledge and expertise Wireless Security Basics

Chapter 7 Transport-Level Security

Huawei WLAN Authentication and Encryption

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Certified Wireless Security Professional (CWSP) Course Overview

Key Management (Distribution and Certification) (1)

Wireless Technology Seminar

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Lecture 2 Secure Wireless LAN

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Network security, TKK, Nov

Security protocols of existing wireless networks

Configuring Security Solutions

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

WIRELESS NETWORK SECURITY

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Application Note: Onsight Device VPN Configuration V1.1

Optimizing Converged Cisco Networks (ONT)

CCMP known-plain-text attack

Wireless Security for Mobile Computers

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Web Security Considerations

ClickShare Network Integration

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

Basic Security. Security Service. Authentication. Privacy. Authentication. Data privacy & Data integrity

Configure WorkGroup Bridge on the WAP131 Access Point

Wireless Networks. Welcome to Wireless

WLAN Information Security Best Practice Document

Three attacks in SSL protocol and their solutions

Network Security Protocols

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Wi-Fi security WEP, WPA and WPA2

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0

Transcription:

Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias <jaime.dias@fe.up.pt>

Symmetric cryptography Ex: RC4, AES 2

Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit string High performance Used for message integrity and identification Ideal function One-way: impossible to know the message from the digest Every message has a different digest Ex: MD-5, SHA-1 3

Public Key Cryptography Confidenciality 4

Public Key Cryptography Authentication (digital signature) 5

Public Key Distribution Problem Ataque MIM: (8) Kpriv Alice [Kpub Alice [ Logo pelas 19h ]]= Logo pelas 19h (3) Logo pelas 20h (1) Kpub Alice (2) Kpub Carol Alice Carol Bob (7) Kpub Alice [ Logo pelas 19h ] (4) Kpub Carol [ Logo pelas 20h ] (5) Kpriv Carol [Kpub Carol [ Logo pelas 20h ]]= Logo pelas 20h (6) Logo pelas 20h Logo pelas 19h O que a Alice julga ter acontecido: (4) Kpriv Alice [Kpub Alice [ Logo pelas 19h ]]= Logo pelas 19h (2) Logo pelas 19h Alice (1) Kpub Alice (3) Kpub Alice [ Logo pelas 19h ] Bob 6

Certification Authority 7

SSL/TLS SSL (Secure Socket Layer) Developed by Netscape Versions 2 e 3 TLS 1.0 (Transport Layer Security) IETF Transparent to application protocols Allows both server and client to be authenticated through certificates Tipically, due to certificate costs Only servers are authenticated Clients are authenticated at the application layer (ex: passwords) 8

802.11 Security Minimum security WEP (Wired Equivalent Privacy) Station authentication Open modeł no authentication Shared Mode Challenge: AP sends challenge Ł station returns the challenge encrypted with the WEP key Confidentiality Ł frames are encrypted with RC4 Integrity Ł CRC32 9

Encryption IV WEP Key SDU WEP PRNG (RC4) XOR ICV Header IV Cryptogram FCS Frame 802.11 Keystream 10

Decryption IV WEP Key SDU WEP PRNG (RC4) XOR ICV Check values ICV Header IV Cryptogram FCS Frame 802.11 Keystream 11

WEP Vulnerabilities Same IV and WEP key same keystream IV too short (24 bits) No mechanism for WEP key update Same keystream: SDU2 SDU1 = cryptogram1 cryptogram2 If SDU1 is known (ICMP, TCP ack, ) then SDU2 = cryptogram1 cryptogram2 SDU1 12

WEP Vulnerabilities (2) RC4 key = IV (3 bytes) + WEP key (5 or 13 bytes) Weak IVs help breaking the WEP key Weak IVs: i:ff:x Ex: Weak IVs for WEP keys of 40 bits 3:ff:X, 4:ff:X, 5:ff:X, 6:ff:X, 7:ff:X 13

WEP Vulnerabilities (3) Integrity Check Value based on CRC32 (linear) WEP does not authenticate nor check the integrity of the frame header Station can change the MAC address AP is not authenticated Rogue AP WEP does not control the frame sequence Replay attacks Same key for every station Traffic can be eavesdropped or even changed by any station knowing the WEP key 14

WEP Vulnerabilities (4) Manufacturers have put some additional barriers Authentication by SSID Station only need to monitor the medium and wait for another station to associate to see the SSID Access control by MAC address Station only need to see the MAC address of allowed stations and clone their address 15

802.1X Access Control Before the Traffic 802.1X authentication Other traffic (blocked) After the Traffic 802.1X authenticatio n Other traffic (unblocked) 16

802.1X with Radius 17

Dynamic WEP Uses 802.1X User authentication Support of multiple authentication methods Centralized data base with users credentials, independent of APs Authentication of the AP Authenticaton keys encryption keys Periodic update of WEP keys 18

Dynamic WEP (2) 1. Authentication through an 802.1X EAP method 2. Generation of MPPE key 6. Station decrypts the WEP key with the MPPE key 7. Station applies the WEP key 4. Generation of WEP 5. AP encrypts key the WEP key with the MPPE key and sends it over EAPOL-KEY 8. AP applies the WEP key 3. MPPE key encrypted with RADIUS key 2. Generation of MPPE key (Microsoft Point-to-Point Encryption) 9. 802.11 data frames are unblocked and encrypted with WEP 19

802.11i WEP failure IEEE 802.11i Uses the 802.1X Authentication/Access Control Pre-shared key (PSK) With Authentication Server - 802.1X Key Management Temporary Keys Authentication keys Encryption keys Data protection CCMP (Counter mode Cipher block Chaining MAC protocol) Based on the AES cipher algorithm TKIP (Temporal Key Integrity Protocol) Based on the RC4 cipher algorithm (same as WEP) Infraestructured and ad-hoc modes 20

Wi-Fi Protected Access WPA Based on Draft 3.0 of 802.11i (2002) Short term solution for legacy equipments No support for CCMP nor the ad-hoc mode TKIP reuses the WEP HW (RC4 cipher algorithm) Firmware upgrade WPA2 Supports 802.11i Long term solution 21

Authentication methods (802.1X) Requires Authentication Server Most popular Wi-Fi authentication methods EAP-TLS EAP-TTLS PEAP 22

EAP-TLS Uses TLS to authenticate both server and user through certificates Mandatory in WPA Cons: Certificates are expensive User identity goes in clear in the user s certificate TLS (authentication of server and user) EAP 802.1X (EAPoL) RADIUS 802.11 UDP/IP ST AP AS 23

Tunneled authentication Two phase authentication TLS tunnel authenticates the Authentication Server User autenticated over the TLS tunel Support of weaker methods for user s authentication Certificates are optional User s identity goes encrypted EAP-TTLS, PEAP 24

EAP-TTLS EAP- Tunneled TLS PAP, CHAP, EAP, (User authentication) TLS (Server authentication) EAP ST 802.1X (EAPoL) 802.11 AP RADIUS UDP/IP AS 25

PEAP Protected Extensible Authentication Protocol v0 Microsoft, v1 Cisco PEAPv0/EAP-MSCHAPv2 the most popular MSCHAPv2, TLS, (user authentication) EAP TLS (server authentication) EAP 802.1X (EAPoL) RADIUS ST 802.11 AP UDP/IP AS 26

Key Management 1. Master Key (MK) generated from the authentication 2. Pairwise Master Key (PMK) generated from the MK 3. PMK sent to the AP through the AAA protocol (RADIUS) 4. Generation of the Pairwise Transient Key (PTK) through the 4-way handshake 5. Group key handshake (GTK) generated by the AP and sent though the Group key handshake Group key handshake 27

Key Management (2) Encrypted with PTK PTK = Hash(PMK, Anonce, Snonce, MACaddr STA, MACaddr AP ) 28

TKIP Key Encryption generation Diminui correlação entre a keystream e a chave de cifragem 29

Data frames WEP, TKIP, and CCMP Authenticated Encrypted 802.11 Header IV / KeyID Data ICV 4octets >=0 octets 4 octets Authenticated Authenticated Encrypted 802.11 Header IV / KeyID Extented IV Data MIC ICV 4octets 4 octets >=0 octets 8 octets 4 octets Encrypted Authenticate d Authenticate d 802.11 Header IV / KeyID 4octets Extented IV 4 octets Data >=0 octets MIC 8 octets 30