1 / 24

Wireless Security Using WEP, WPA, and WPA2

Wireless Security Using WEP, WPA, and WPA2. By Johnathan Stump Marius Pettersen. Overview. RCA4 WEP Flaws WPA WPA2. RCA4-Description. Stream Cipher Used in SSL Simple Pseudorandom Key PRGA. PSGR.

mtannenbaum mtannenbaum
Download Presentation

Wireless Security Using WEP, WPA, and WPA2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security Using WEP, WPA, and WPA2 By Johnathan Stump Marius Pettersen

  2. Overview • RCA4 • WEP • Flaws • WPA • WPA2

  3. RCA4-Description • Stream Cipher • Used in SSL • Simple • Pseudorandom Key • PRGA

  4. PSGR • The lookup stage of RC4. The output byte is selected by looking up the values of S(i) and S(j), adding them together modulo 256, and then looking up the sum in S; S(S(i) + S(j)) is used as a byte of the key stream, K.

  5. RC4-Weaknesses • First bits in Keystream are biased • No Separate nonce • Possibly Hash to fix • Combinatorial Attack

  6. WEP-Description • Uses RC4 • 40 bit key with 24 bit initialization vector • Moved to 104 bit key with 24 bit IV • Standard from cryptography laws • Uses Hexadecimal format • 26 chars, 4x26 bits = 104 bits

  7. WEP-Encryption • Basic WEP Encryption: RC4 Keystream XORed with Plaintext

  8. WEP-Encryption

  9. WEP-Decryption

  10. WEP-Security Flaws • Key • 24 bit IV, repeated key • Single Shared Key • Very Easy to “Eavesdrop” • Easy as 1 minute of work sometimes

  11. Too Many Flaws? • What next?

  12. WPA (Wi-Fi Protected Access) • Constructed by Wi-Fi Alliance • Using RC4 encryption • EAP(Extended Authentication Protocol) • Michael (MIC) message integrity • Designed for use with 802.1X • More secure than WEP

  13. WPA Uses RC4 with 4 new features: • Extended 48-bit Initialization Vector (IV) and IV Sequencing Rules • A Message Integrity Code (MIC) • Key Derivation and Distribution • Temporal Key Integrity Protocol generates per-packet keys

  14. 1.Extended 48-bit IV and IV Sequencing Rules • A 48 bit vector increases the number of possible initialization vectors (2^48) and key/IV combinations. • Prevents reuse and collision of IV • Blocks weak IV’s • Implements advanced sequencing rules

  15. 2. Key derivation and Distribution • Password-Based Key Derivation version 2 • Derives keys using a Pseudorandom function to derive keys. Using a passphrase and a salt. • Keys are distributed • Using a four-way handshake • Using Pairwise Master Key, Client Random number, Client MAC, AP random number, AP MAC • Gives 4 values (Data encryption key, Data integrity key, Key exchange encryption key, Key exchange integrity key

  16. 3.Temporal Key Integrity Protocol generates per-packet keys • Synchronized changing of the unicast encryption key

  17. WPA encryption

  18. WPA decryption

  19. WPA2 WI-FI Alliance: http://www.wi-fi.org/knowledge_center/webcast-wpa-061103/

  20. WPA2 Integrity check (CBC)

  21. WPA2 Counter encryption

  22. WPA2 Encryption

  23. WPA2 Decryption

  24. References • WIKI Pedia (http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy) • WI-FI (http://www.wi-fiplanet.com/tutorials/article.php/1368661) • IEEE Std 802.11i™-2004 (http://standards.ieee.org/getieee802/download/802.1X-2001.pdf) • WI-FI protected Access Web cast (http://www.wi-fi.org/files/kc_17_WPA%20Web%20Cast_6-11-03.pdf) • Cracking Wi-Fi Protected Access(http://www.ciscopress.com/articles/article.asp?p=369221&seqNum=3&rl=1) • IEEE 802.11 Wireless LAN security with Microsoft Windows - white paper (http://www.microsoft.com/downloads/details.aspx?FamilyID=67fdeb48-74ec-4ee8-a650-334bb8ec38a9&displaylang=en)

More Related

聚圣源拼搏论坛宋词取名起名大全女孩电子导游我国起重机公司排名喜临门吊顶吉祥字大全 起名少女慈禧起名怎么取匆匆那年2dota地图ai下载周易缘起名诈骗沫字起名寓意畸形儿起英文名网取名免费陈杨真三国无双蓝宝石恋爱选举巧克力力克软件骞字起名字是不是不好给宝宝起啥乳名好日本天皇杯直播寓意好的成语可起名字好听鞍山起名馆名录张墨锡黑白直播体育五行缺土五行缺土的起名今年男起啥名女孩起名带媛字的起名字测名字草字头加西淀粉肠小王子日销售额涨超10倍罗斯否认插足凯特王妃婚姻让美丽中国“从细节出发”清明节放假3天调休1天男孩疑遭霸凌 家长讨说法被踢出群国产伟哥去年销售近13亿网友建议重庆地铁不准乘客携带菜筐雅江山火三名扑火人员牺牲系谣言代拍被何赛飞拿着魔杖追着打月嫂回应掌掴婴儿是在赶虫子山西高速一大巴发生事故 已致13死高中生被打伤下体休学 邯郸通报李梦为奥运任务婉拒WNBA邀请19岁小伙救下5人后溺亡 多方发声王树国3次鞠躬告别西交大师生单亲妈妈陷入热恋 14岁儿子报警315晚会后胖东来又人满为患了倪萍分享减重40斤方法王楚钦登顶三项第一今日春分两大学生合买彩票中奖一人不认账张家界的山上“长”满了韩国人?周杰伦一审败诉网易房客欠租失踪 房东直发愁男子持台球杆殴打2名女店员被抓男子被猫抓伤后确诊“猫抓病”“重生之我在北大当嫡校长”槽头肉企业被曝光前生意红火男孩8年未见母亲被告知被遗忘恒大被罚41.75亿到底怎么缴网友洛杉矶偶遇贾玲杨倩无缘巴黎奥运张立群任西安交通大学校长黑马情侣提车了西双版纳热带植物园回应蜉蝣大爆发妈妈回应孩子在校撞护栏坠楼考生莫言也上北大硕士复试名单了韩国首次吊销离岗医生执照奥巴马现身唐宁街 黑色着装引猜测沈阳一轿车冲入人行道致3死2伤阿根廷将发行1万与2万面值的纸币外国人感慨凌晨的中国很安全男子被流浪猫绊倒 投喂者赔24万手机成瘾是影响睡眠质量重要因素春分“立蛋”成功率更高?胖东来员工每周单休无小长假“开封王婆”爆火:促成四五十对专家建议不必谈骨泥色变浙江一高校内汽车冲撞行人 多人受伤许家印被限制高消费

聚圣源 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化