Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile and Wireless Communication Security By Jason Gratto.

Similar presentations


Presentation on theme: "Mobile and Wireless Communication Security By Jason Gratto."— Presentation transcript:

1 Mobile and Wireless Communication Security By Jason Gratto

2 WEP (Wired Equivalent Privacy) Intended to provide confidentiality Key size:40 bits Key distribution: Manual Meant to protect wireless communication from eavesdropping Also meant to prevent unauthorized access to wireless network

3 Goals of WEP Access Control Data Integrity Confidentiality

4 Protocol of WEP Uses a secret key between the computer and the access point – The secret key is used to encrypt the packets – No standard for sharing the key but in practice a single key is shared between all of the computers and access points.

5 WEP - Procedure Generates a checksum Generates a keystream with a chosen IV (Initialization Vector) v with RC4 XOR between message/checksum and the keystring Transmits the v and the ciphertext

6 WEP – Procedure

7 WEP - Defenses Integrity Check (IC) – Used to ensure packet wasn’t modified in transit Initialization Vector (IV) – Used to avoid encrypting two ciphertexts with the same key stream – Used to augment the shared key and produce a different RC4 for each packet

8 WEP – Vulnerabilities ICV insecure – ICV is a algorithm for creating the checksum, based on CRC32 and can be modified to match the contents of the message. IV key reuse – Because a small IV value is used, IV values end up being reused, compromising the security. Authentication forging – Using a recovered key stream and IV the authentication can be forged.

9 WEP – Attack types Passive – Eavesdropping on wireless traffic Active – Constructing it’s own encrypted packets when plaintext is known Active from both sides – Constructing it’s own encrypted packets when only header is known by guessing. Dictionary building – Computing the key stream using a decryption table

10 Wi-Fi Protected Access (WPA) Key size: 128 bits Hash method: ICV, MICHAEL Key distribution: TKIP (Temporal Key Integral Protocol) Inclusion of EAP certification for enterprise versions of WPA

11 MICHAEL MICHAEL generates a MIC (Message Integrity Code) – 8 bits long – Placed between the data and the ICV

12 TKIP Made to address security problems with WEP Looks to client’s configuration to determine what kind of key to use Sets a unique default key for each client

13 TKIP - Defenses Implements a key mixing function that combines a secret key with an IV before performing RC4 initialization If packets are received out of order, they are rejected by the access point Implements the MICHAEL integrity check to prevent forged packets from being accepted

14 Extensible Authentication Protocol (EAP) Is a transmission method and framework for authentication protocols – Works with many other authentication protocols such as RADIUS and Kerberos Uses a variety of different transport methods

15 EAP Originally designed for wired connections – To be used in a wireless environment, the “tunneled” EAP method was created, wrapping the EAP in a stronger encrypted EAP Common transport methods – EAP-TLS (Transport Layer Security) – EAP-TTLS (Tunneled Transport Layer Security) – PEAP (Protected EAP) – LEAP (Light EAP)

16 EAP Types PEAP – Interior MSCHAPv2 inside a secure TLS tunnel EAP-TTLS – Interior EAP-MD5 inside a secure TLS tunnel LEAP – Modified version of MSCHAP – Vulnerable to dictionary attacks

17 WPA –Vulnerabilities Denial of Service – Any time forged and unauthorized data is detected, it shuts the access point down for 60 seconds Because of this it is easy to shut down access points using little network activity

18 WPA2 Updated version of WPA Uses AES encryption and allows use of RADIUS (Remote Authentication Dial In User Service) authentication protocol

19 RADIUS Protocol for communication between Network Access Server (NAS) and a remote authentication server Requires clients and servers

20 RADIUS Data needed for authenticaiton – User data IP Name or address Shared secret key – User information Username and password – Session information Speed, port, NAS ID

21 RADIUS – Database The database can be stored in a number of different ways – A text file – Password file – Netware directory The database can authenticate in a number of ways as well – Username/password – SecurID Token Card

22 RADIUS After authentication is requested, the RADIUS server either accepts or rejects the NAS based on the following – Session timers – Filters – IP Address – IDSN Session Parameters

23 RADIUS ISP User Database ISP Modem Pool User dials modem pool and establishes connection UserID: bob Password: ge55gep UserID: bob Password: ge55gep NAS-ID: 207.12.4.1 Select UserID=bob Bob password=ge55gep Timeout=3600 [other attributes] Access-Accept User-Name=bob [other attributes] Framed-Address=217.213.21.5 The Internet ISP RADIUS Server Internet PPP connection established ISP User Database ISP Modem Pool User dials modem pool and establishes connection UserID: bob Password: ge55gep UserID: bob Password: ge55gep NAS-ID: 207.12.4.1 Select UserID=bob Bob password=ge55gep Timeout=3600 [other attributes] Access-Accept User-Name=bob [other attributes] Framed-Address=217.213.21.5 The Internet ISP RADIUS Server Internet PPP connection established

24 Sources http://www.cs.fsu.edu/~yasinsac/group/slides /cubukcu.pdf http://www.cs.fsu.edu/~yasinsac/group/slides /cubukcu.pdf http://islab.oregonstate.edu/koc/ece478/05R eport/Kalina.ppt http://islab.oregonstate.edu/koc/ece478/05R eport/Kalina.ppt http://its.ndsu.edu/fileadmin/www.its.ndsu.ed u/pdfs/Wireless_EAP.pdf http://its.ndsu.edu/fileadmin/www.its.ndsu.ed u/pdfs/Wireless_EAP.pdf http://www.ceenet.org/workshops/lecture98/ri chard/2-radius/index.htm


Download ppt "Mobile and Wireless Communication Security By Jason Gratto."

Similar presentations


Ads by Google