The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.

Slides:



Advertisements
Similar presentations
1 Intercepting Mobile Communications: The Insecurity of …or “Why WEP Stinks” Dustin Christmann.
Advertisements

Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study Nick Petroni Jr., William Arbaugh University of Maryland Presented by: Abe Murray.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CSC-682 Advanced Computer Security
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Analyzing Wireless Security in Columbia, Missouri Matthew Chittum Clayton Harper John Mixon Johnathan Walton.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Module 48 (Wireless Hacking)
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
An Inductive Chosen Plaintext Attack against WEP/WEP2
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College

Paper Outline Introduction Who Uses WEP? Why? How Does WEP Work? History of WEP Attacks Fragmentation Attack Conclusions

Introduction What is WEP (Wired Equivalent Privacy)? WEP uses a RC4 cipher (stream cipher) which attempts to keep the wireless data private and exact. WEP is broken (well-known fact) However, few people are capable of carrying out an attack Why?  Lack of knowledge. Attack requires long waiting time. Therefore – many still use WEP… (alternative is WPA – more difficult to setup and manage?)

Who Uses WEP? Vendors recommend i – however only a small percentage use it. Why? New cards needed Some believe “dynamic re-keying” is enough Encryption methods used in encrypted networks (%)

How Does WEP Work? Goals of WEP: Privacy of frames Integrity of frames Uses a symmetric stream cipher…(RC4)

How Does WEP Work? symmetric stream cipher Plaintext

How Does WEP Work? Input: Data Frame Key IV (initialization vector) Output: Encrypted payload IV Keynumber

How Does WEP Work? Keystream Each IV (initialization vector) produces a different seed  different keystream IV = 24 bits therefore 2 24 different keystreams Possible to know one keystream (IV/Key produced) and transmit everything with it (thus an attacker need only know one keystream to transmit) KEYSTREAM xor TEXT  CIPHERTEXT

How Does WEP Work? What gets encrypted? “ header is always in CLEARTEXT and both MANAGEMENT and CONTROL frames are transmitted unscrambled”

History of WEP Attacks Brute-force Try all possible combinations (40-bit key) Less than a month on a single computer Passphrase generated keys lessen the effort Keys connected to actual meaningful words Solution: 104-bit WEP defends against attack

History of WEP Attacks Keystream Re-use Known cleartext then keystream recovered ciphertext xor cleartext  keystream “shared key authentication” AP sends cleartext challenge “encrypt this…” Peer sends encrypted version back to AP Snooping attacker now has keystream for IV  standard says “don’t reuse keystream for IV” However, attacker can now transmit indefinitely Solution: SSID cloaking & MAC address filters

History of WEP Attacks Weak IV Attacks Key could be calculated (based on RC4 properties) Takes approx. 1,000,000 packets Major threat – automated tool (anyone can hack) Solution: NIC hardware filter to filter weak IVs - could now take days - Problem: fewer keystreams (< 2 24 keystreams) A single legacy host (without filter) can compromise network

Two Main Attacker Problems Weak IV attack is slow Hacker Solution: Replay WEP packets – generate traffic Need to get keystream reliably Hacker Solution: Get a byte of keystream after sending only 256 packets WEP IS FINALLY DEAD? Good Guy Solution: Change key often…( frequent re- keying ) NEW ATTACK: fragmentation – instant results

Fragmentation Attack Works against frequent re-keying WEP design flaw: layer 2 fragmentation… Step 1. Need known plaintext in frames LLC/SNAP header contained in data frames 8 bytes of known plaintext

Fragmentation Attack Step 2. Recover keystream associated with IV. cipher xor known plaintext  keystream Step 3. send 4 bytes payload/4 bytes ICV ( integrity check value ) Note: never considered a problem - LLC/SNAP alone needs 4 bytes.

Fragmentation Attack Only 4 bytes of payload? Answer: fragmentation Send up to 16 fragments of 4 byte payload 4x16  64 bytes of data

Pure Fragmentation Attack Transmission Steps 1. eavesdrop one packet – get 8 bytes 2. send data up to 64 bytes use IP fragmentation to send larger payloads Datagram IP fragment – 64 bytes frag 4 bytes frag 4 bytes frag 4 bytes frag 4 bytes

Pure Fragmentation Attack Decryption (Forwarding to the Internet) Steps 1. capture packet to decrypt 2. prepend additional IP header & forward to AP 3. AP assembles into single packet & decrypts 4. AP sends cleartext packet to destination host 5. Attacker recovers packet from controlled host Wait, it’s not quite that easy…

Pure Fragmentation Attack Why is it not quite that easy? Problem 1: Need Router’s MAC address and proper source address for network…to send. Problem 2: How about packets which meet the MTU limit? Using the AP to decrypt & send along

Pure Fragmentation Attack Problem 1: Need Router’s MAC address and proper source address for network…to send. Need MAC address of router Often AP is router (look for beacon frames) Most popular MAC used Need correct source IP In some networks this is not needed

Pure Fragmentation Attack Problem 2: How about packets which meet the MTU limit? MTU packets ( if packet > MTU-28 bytes then trouble ) Techniques Bit-flip destination address Chop-chop Spoof ICMP “packet too big” message Pure Fragmentation requires access to internet controlled host – not possible with private network Solution: Keystream Based Attacks

Keystream Attacks 1. Discover all possible keystreams (Dictionary attacks) - however the result is one long list of keystreams 2. Discover one specific keystream Remember: if keystream known & packet snooped with corresponding IV then plaintext is now known. ATTACKER’s GOAL

Keystream Attacks Discovering Keystreams Steps Acquire ability to send data (discussed earlier) Send large broadcast frame in small fragments AP will reassemble it and relay as large frame Attacker listens & obtains keystream for the new IV chosen by the AP Attacker does plaintext XOR to get new keystream for IV

Keystream Attacks Discovering Keystreams 34 fragments  1500 bytes of keystream 16 frags (4 bytes/frag)  64 bytes of keystream 16 frags (64 bytes/frag)  1024 bytes 2 frags (1024 bytes/frag & 476 bytes/frag)  1500 bytes

Keystream Attacks Discovering Keystreams To recover other keystreams – attacker sends 1500 bytes (without fragmentation) and snoops the relayed version by AP (most likely using a different IV) By sending approx. 16M (2 24 ) packets a complete IV dictionary is built.

Keystream Attacks Discovering a Specific Keystream What happens if you need a specific keystream in order to decrypt a specific packet? steps 1. recover keystream (8 bytes) via known plaintext 2. generate datagram of size 5 (8 – 3 bytes) 3. compute 4 byte CRC for payload (use only 3 bytes) 4. XOR with 8 byte pseudo-random stream 5. Append last byte (9 th byte – guess)

Keystream Attacks Discovering a Specific Keystream CRCData 5 bytes xorkeystream encrypted data Iterate through all 256 possibilities IV Hdr

Keystream Attacks Discovering a Specific Keystream steps (cont.) 6. send frame & wait for AP to broadcast 7. if no response from AP – try again with new last byte else we know that our last byte guess matches the last byte of the correct CRC (which we know) therefore we can calculate one more byte of the keystream. next byte of keystream = byte guessed xor last known byte of CRC

Keystream Attacks Instead of Timing the AP: Use multicast to do this – All 256 guesses sent in parallel to 256 different multicast addresses When AP relays one then simply read off the correct guess from the multicast address. Therefore after sending 380,928 packets (most often less) – an arbitrary packet may be decrypted Well-known multicast addresses

Conclusion Using Fragmentation: Takes less than a minute for an attacker to be able to send MTU-sized packets (and find out the IP address range of the network) About 15 minutes to recover 40-bit WEP keys About minutes to recover 104-bit WEP keys WEP is officially DEAD – fragmentation used in conjunction with these other attacks counters the final countermeasure: frequent re-keying Checkmate!