Intercepting Mobiles Communications: The Insecurity of 802.11 Danny Bickson ACNS Course, IDC Spring 2007.

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless Privacy: Analysis of Security Nikita Borisov UC Berkeley
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Temporal Key Integrity Protocol (TKIP) Presented By: Laxmi Nissanka Rao Kim Sang Soo.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
A History of WEP The Ups and Downs of Wireless Security.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Xiuzhen Cheng Xiuzhen Cheng Csci388 Wireless and Mobile Security – Temporal Key Integrity Protocol.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
WEP & WPA Mandy Kershishnik.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Wireless Privacy: Analysis of Security
IEEE i Dohwan Kim.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
An Inductive Chosen Plaintext Attack against WEP/WEP2
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007

Resources  Borisov, Goldberg, Wagner. Intercepting mobile communications: the insecurity of the 7th annual international conference on Mobile computing and networking. p-draft.pdf Guillaume Lehembre Wifi Security: WEP, WPA and WPA2 9_wifi/hakin9_wifi_EN.pdf

WEP Protocol  WEP – Wired Equivalent Privacy  Wireless standard  Link layer  Protocol goals: Confidentiality: prevent eavesdropping Access control: prevent unauthorized access Data integrity: prevent tampering of messages  We show that none of the security goals are attained

Network Model Internet

WEP Algorithm Encryption MessageCRC(M) RC4(k,IV) CipherIV

WEP Algorithm Decryption MessageCRC(M) RC4(k,IV) CipherIV

Confidentiality

Stream cipher properties  Given two ciphers C 1,C 2 – C 1  C 2 = P 1  P 2.  Keystream reuse can lead to a number of attacks: If plaintext of one message is known, the other is immediately obtainable. In the general case, known techniques for breaking reused keystreams. As the number of reused keystream increases breaking them becomes easier.  Two conditions required for this class of attcks to succeed: Availability of ciphertexts where keystream is used more than once. Partial knowledge of some of the plain texts.

Finding instances of keystream reuse  Shared key k changes rarely.  Reuse of IV causes reuse of keystream.  IV are public.

IV Usage  Standard recommends (but not requires) change of IV.  Common PCMCIA cards sets IV to zero and increment it by 1 for each packet.  IV size is only 24 bits.  Busy access point of 5Mbps will exhaust available space in 11 hours.  Birthday paradox: on random IV selection 5000 packets are needed w.h.p. to find a collision

Exploiting keystream reuse  Many fields of IP traffic are predictable.  For example: login sequences.  Active attack (known plaintext)

Decryption dictionaries  Once plaintext of encrypted message is obtained, keystream value stored in dictionary.  Full table requires 24GB  Size of dictionary does not depend of size of key

Key management

Message Authentication  Message modification  Message injection

Message Modification  Checksum used is CRC-32 which is a linear function of the message:  In other words, checksum distributes over the XOR operation. C(x  y) = C(x)  C(y)  RC4 stream cipher also linear.

The attack Given C we would like to create C ’ s.t. C ’ decrypts to M ’ instead of M. MessageCRC(M) RC4(k,IV) Cipher  CRC(  )  = MessageCRC(M) RC4(k,IV)  CRC(  ) = RC4(k,IV) ’’CRC(  ’) =

Message Injection  WEP checksum is an unkeyed function of the message.  After knowing one keystream we can use it forever. C ’ =  RC4(IV,k)

Other attacks  IP redirection. Assumption: Destination address is known.

IP redirection (cont.)  Need to calculate IP checksum  Several options IP checksum for original packet is known Original IP checksum is not known Compensate by changing another IP field

Reaction Attack  Works only for TCP protocol  Pick i at random, let be all zeros, except for positions i and i+16. Calc C ’ = C   Two options: 1. Got an acknowledgment, P i  P i+16 = 1 2. Else P i  P i+16 = 0  Each test reveals 1 bit of information

Example attacks

ARP Request

Conclusion  Design of security protocols is difficult (more than the design of network protocols)  Combining several secure algorithms does not mean that the result is secure  Engineering perspective dictated selection of cryptographic algorithms

Fixing WEP WPA – Wi-Fi Protected Access and i

WPA  WPA – Wi-Fi Protected Access Draft security enhancements for A subset of the i proposed standard Proposed by IEEE TGi (Task Group i)  Design goals Preserve packet format Work with deployed hardware in AP and NICs  Composed of two components Authentication and master key generation – 802.1X TKIP (Temporal Key Integrity Protocol) - Temporal key generation, Confidentiality and Integrity

802.11i  A proposed standard  Defines authentication, key management, confidentiality, integrity and encapsulations for  Includes WEP (current implemented)  Encryption: RC4; Integrity: CRC-32 TKIP (temporary solution)  Encryption: RC4; Integrity: Michael WRAP (Wireless Robust Authenticated Protocol)  Encryption: AES; Integrity: HMAC-MD5

TKIP – Temporal Key Integrity Protocol

TKIP Components  TKIP is a wrapper around WEP  A cryptographic MIC (Message Integrity Code)  A per-packet sequence number  A per-packet key mixing function  A rekeying mechanism (802.1X)

TKIP MIC  MICHAEL the MIC function is designed for very low bandwidth CPU (the ones that are used by the Access Point)  Key length – 64 bits  The MIC is computed over the source address, the destination address and the data Protects against packet modification (e.g. bit flipping) Protects against header forgery

WEP with Enabled MIC =CRC =MAC

TKIP Sequence Counter  The station and the Access Point maintain a TKIP sequence counter  The transmitter increments the TKIP sequence counter each time it sends a packet  The counters are reset when new temporal keys are established  The sequence counter is mixed with the temporal key and the transmitter MAC address to create a RC4 seed key  On receipt the receiver de-mixed the key and checks that the resulting counter is indeed greater than the all the sequence counter that were encountered during this temporal key usage  Protects against replay attack

TKIP Keys  TKIP is using temporal keys  The station and the Access Point periodically exchange temporal keys  Four keys One Integrity (MIC) and one Encryption key per direction

TKIP ENCAPSULATION

TKIP Encapsulation  Calculate the 64 bits MIC with the MIC temporal key, over the source and destination addresses. The MIC is inserted into the message data  The sequence number, the MAC address and the temporal key are mixed to create a 128 bits RC4 seed key  The first three bytes of the key are stored in the IV field  The remaining 13 bytes are stored in a free WEP key buffer  The packet is sent to WEP processing

TKIP DECAPSULATION

TKIP Decapsulation  The IV and the temporal key are concatenated, to create the RC4 seed key  The key is de-mixed – to create the TKIP sequence counter. The counter is checked to be in sequence  The key, the IV and the data are sent for WEP decapsulation  After RC4 decryption, the MIC, with the temporal MIC key, is computed over the source and destination addressed and the decrypted packet, and is compared to the MIC field in the packet

TKIP Notes  The TKIP temporal key must be exchanged every less then 2 16 packets, since the key mixing can produce 2 16 different IVs  The MIC and key mixing algorithms are cryptographically weak But, all the WEP known problems are solved TKIP is a temporary solution – until NICs and APs with new hardware arrives to the market  The i uses AES encryption