1 / 15

Wireless Security Issues

Wireless Security Issues. Cheyenne Hollow Horn SFS Presentation 2004. Presentation Outline. WEP WPA TKIP Optical Wireless Solution. WEP. Wired Equivalency Protocol First WLAN security protocol. Four major categories of flaws: No forgery protection. No protection against replays.

Download Presentation

Wireless Security Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004

  2. Presentation Outline • WEP • WPA • TKIP • Optical Wireless Solution

  3. WEP • Wired Equivalency Protocol • First WLAN security protocol. • Four major categories of flaws: • No forgery protection. • No protection against replays. • RC4 encryption exposes protocol to weak key attacks. • Encrypted data can be decrypted with out learning encryption key.

  4. WEP Encryption • Each packet is encrypted with a RC4 cipher stream. • The key uses an initialization vector and 40 – bit WEP key. • The data is bitwise XOR-ed with the key. • IV chosen by sender and sent with each packet.

  5. WEP Encryption Flaws • Key management and size • IV is too small • Authentication messages can be easily forged.

  6. WPA • Wi-Fi Protected Access • Wi-Fi Alliance created early 2003 • Based on IEEE 802.11i • WPA specifies user authentication, better encryption, and data validation.

  7. WPA • Authentication: • Uses 802.1x protocol • 802.1x based on EAP • Alternate PSK • Data encryption: • TKIP • Data validity: • MIC

  8. TKIP • Cryptographic message integrity code, MIC • New IV sequencing discipline • Pre-packet key mixing function • Rekeying mechanism

  9. MIC • Three components: • Authentication key K • Tagging function • Verification predicate • The tagging function takes key and message and generates tag. • Receiver uses K, M, and T.

  10. IV Sequence Enforcement • When transmission begins sender and receiver initialize to zero • The IV field used as packet sequence number. • Receiver is required to increment sequence number • If out of order packet is discarded

  11. Key Mixing • Two phases • Phase I: • Temporal key and MAC address of local wireless interface used. • Phase II: • Uses tiny cipher to “encrypt” each packet.

  12. Rekeying • Delivers fresh keys consumed by the various TKIP algorithms • Eliminates attacks by guessing static keys.

  13. Optical Wireless Communications • Layer 1 advantage • LIGHTPOINTE • Works near infrared wavelengths • Information relayed at several hundred THz • Narrow beam, hard to intercept signal

  14. More on Optical Wireless • Military organizations use this • Blocking the beam stops transmission • Utilizes WPA to have a stronger system

  15. Questions?

More Related