By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Chalmers University of Technology Wireless security Breaking WEP and WPA.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Chapter 21 Public-Key Cryptography and Message Authentication.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Justin Kontny, Chris Nassouri, and Matt Martens.  The first generation wireless modems were created in the early 1980's by amateur radio operators. 
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date:
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Wireless security Wi–Fi (802.11) Security
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Wireless Security Ian Bodley.
Cryptography and Security Fall 2009 Steve Lai
IEEE i Dohwan Kim.
The RC4 Algorithm Network Security.
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

By Sean Fisk

 Not a new technology  Inherently insecure  In recent years, increased popularity

 Symmetric key  Public key

 Only known type until 1976  Shared secret  Secure exchange

 Block cipher Fixed length Joining protocols  Stream cipher Variable length

 Public key Diffie and Hellman in 1976 Message is encrypted with public key Can only be decrypted with private key

 Computational complexity of mathematical problems  Diffie-Hellman Discrete logarithm problem  Rivest, Shamir, and Adleman (RSA) Integer factorization problem

 Public key encryption is much slower than symmetric key encryption  Diffie-Hellman Key Exchange protocol

 “The main intention of the WEP was not to provide a level of security superior to or higher than that of a wired LAN, but equivalent to it.” (Bulbul, Batmaz and Ozel)

 Rivest’s Cipher 4 (RC4) 64-bit  40-bit WEP key  24-bit Initialization Vector  Cyclic Redundancy Code (CRC)

 CRC not intended for message integrity  Key too short  Key as direct input to cipher  Initialization vector Interesting values

 Run on same hardware  Temporal Key Integrity Protocol (TKIP)  Still uses RC4 cipher 128-bit key  Message Integrity Code replaces CRC  Exstensible Authentication Protocol Uses public key encryption

 Continuation of RC4 cipher First few bytes are strongly non-random (Fluhrer, Mantin, Shamir)

 Also known as WPA2  Advanced Encryption Standard Joined with CCMP  Continues use of EAP

 Data Encryption Standard  Advanced Encryption Standard  Standardized by National Institute of Standards and Technology (NIST)

 Symmetric, block cipher  56-bit key  Feistel function  “In 1999, the Electronic Frontier Foundation’s ‘Deep Crack’ machine, in combination with distributed.net, successfully solved RSA’s DES Challenge III in 22 hours and 15 minutes.” (RSA Labs)  Triple DES

 Public competition 5 year process 15 ciphers Winner: Rijndael by Daemen and Rijmen  Symmetric, block cipher  128, 192, or 256-bit key

 End-to-end encryption  Trusted endpoints  Wireless hotspots

 Bulbul, Halil Ibrahim, Ihsan Batmaz and Mesut Ozel. "Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols  dlaverty. WPA vs WPA2 (802.11i): How your Choice Affects your Wireless Network Security.  Fluhrer, Scott, Adi Shami and Itsik Mantin. Weaknesses in the Key Scheduling Algorithm of RC4.  Masadeh, S.R., et al. "A comparison of data encryption algorithms with the proposed algorithm: Wireless security.“  National Institute of Standards and Technology. "FIPS Advanced Encryption Standard.“  RSA Labs January 2011.