Wep, Wpa Good
Wep, Wpa Good
Wep, Wpa Good
■ Wi-Fi security
■ WEP, WPA, WPA-2
■ Mobile device security
■ GSM & UMTS security
■ IEEE 802.11/11i
■ WLAN security
■ VPN security
Wireless LAN Security
Agenda
■ Brief background on Wireless LAN
■ Basic security mechanisms in 802.11
■ WEP Vulnerabilities
■ Enhancing wireless security with WPA
■ Comparing WEP and WPA
Brief Background
■ A local area network (LAN) with no
wires
■ Several Wireless LAN (WLAN) standards
802.11 - 1-2 Mbps speed, 2.4Ghz band
802.11b (Wi-Fi) – 11 Mbps speed, 2.4Ghz band
802.11a (Wi-Fi) - 54 Mbps speed, 5Ghz band
802.11g (Wi-Fi) – 54 Mbps speed, 2.4Ghz band
Wireless network components
Security Challenges and
Solutions
■ Challenges
Beyond any physical boundaries
Encryption, Authentication and Integrity
■ Basic Security Mechanisms in 802.11
Service Set ID (SSID, 32 bit) – Acts like a shared
secret, but sent in clear, same for all devices in a
WLAN.
MAC Address Lists – Modifiable and also sent in
clear.
The WEP Algorithm
WEP
WEP was designed to provide the same privacy that a user would
have on a wired network. WEP is based on the RC4 symmetric
encryption standard and uses either a 64-bit or 128-bit key.
WEP’s security issue actually begins here, because the entire
64- or 128-bit key is not used for encryption, and 24 bits of this
key are actually pealed off for use as an initialization vector (IV).
The purpose of the IV is to encrypt each packet with a different
key. This is accomplished by adding the IV to the 40-bit or
104-bit preshared key (PSK). The result is IV + PSK. This also
has reduced the effective key strength of the process because
the effective lengths of the keys are now only 40 or 104 bits.
PSK
There are two ways to generate and use
the PSK:
■ First, the default key method shares a
IV IV
Key
Seed PRNG Sequence XO Ciphert
R ext
Secret
Key
Integrit
CRC-32 y
Plainte Check
xt Algorithm
value
Plainte
xt
Data payload
Nonce N
Station B
Station A
E(N, KA-B)
Authentication response
WEP – The “flawed” Solution
■ Weakness in key management
Single key for all access points and client radios
Static unless manually changed
Authentication and encryption keys are the same
■ Shared key authentication failure
No knowledge of secret to gain network access
WEPPR=C ⊕ P (where C, P are passively recorded)
Authentication request
er
Attack
Challenge R P
WEPPR ⊕ R A
Success
WEP – The “flawed” Solution
(contd.)
■ Weakness in Encryption
Short 24-bit IV, reuse mandatory
Weak per-packet key derivation - exposes RC4
protocol to weak key attacks. Given c1 and c2 with
same IV, c1⊕ c2= p1⊕p2 [p1⊕ S ⊕ p2 ⊕ S], leading to
statistical attacks to recover plaintexts
Short 40-bit encryption scheme
■ No forgery protection
Using CRC-32 checksum possible to recompute
matching ICV for changed data bits
Given C= RC4(IV, key) ⊕ <M, ICV(M)>, can find C’
that decrypts to M’=M+Δ such that C’= RC4(IV,
key) ⊕ <M’, ICV(M’)>
WEP – The “flawed” Solution
(contd.)
■ No protection against replays
■ Optional, mostly not turned on by users
Design Constraints
■ WEP patches will rely entirely on
software upgrade
■ Access points have little spare CPU
capacity for new functions
■ Encryption functions are hard-wired in
the access points
Enhancing WLAN Security with
WPA
■ WPA - Wireless Protected Access
■ Strong, standards based, interoperable
security for Wi-Fi
■ Addresses all known weaknesses of WEP
■ Subset of forthcoming IEEE 802.11i standard
■ Designed to run as a software upgrade on
most Wi-Fi certified products.
Security Mechanisms in WPA -
TKIP
■ Uses TKIP (Temporal Key Integrity Protocol)
Encryption.
■ Suite of algorithms wrapping WEP
■ Adds 4 new algorithms to WEP:
1. New cryptographic message integrity code (MIC)
called Michael - to defeat forgeries
2. New IV sequencing discipline - to remove replay
attacks
3. A re-keying mechanism – to provide fresh
encryption and integrity keys
More on TKIP
EAP-identity request
EAP-identity response
EAP success/reject
EAP success/reject
WPA Modes of Operation -
Pre-shared key vs. Enterprise
■ Pre-shared Key Mode for home/SOHO users
Does not require authentication server
“Shared Secret” or password entered manually in
the AP and wireless client.
WPA takes over automatically.
Only the clients with matching passwords are
allowed to join the network.
The password automatically kicks off the TKIP
encryption process.
■ Enterprise Mode for corporate users
Requires an authentication server like RADIUS
Centralized management of user credentials
WPA modes of operation –
Enterprise Mode
Access Point
Interne
t
Authentication server
WEP vs. WPA
WEP WPA
Encryption Flawed Fixes all WEP flaws
40-bit keys 128-bit keys
Static-same keys Dynamic session keys.
used by everyone on Per-user, per-session,
network per-packet keys
Manual distribution Automatic Distribution
Authentication Flawed, uses WEP Strong user
key itself authentication using
802.1X and EAP
Comparing WPA and 802.11i
802.11i
802.1X
Key management WPA
Cipher & Authentication negotiation
TKIP
AES
Conclusion
■ WPA is not an ideal security protocol design…
■ However, it is a dramatic improvement in
Wi-Fi security.
■ Has not been broken (yet).
■ Protects the original hardware investment.
■ If hardware constraint removed, a more
robust security solution possible.
■ Such a solution is being developed based on
a even stronger cryptographic cipher -
Advanced Encryption Standard (AES).
References
[1] Bruce Potter & Bob Fleck, “802.11
Security”, O-Reilly, December 2002
[2]James larocca & Ruth larocca, “802.11
Demystified”, McGraw-Hill Telecom, 2002
[3]Whitepaper on Wireless LAN Security on
http://www.wi-fi.org
[4]http://www.ieee802.org/1/pages/802.1
x.html