encryption, privacy, & authentication chris r chris h mindy c

Post on 19-Dec-2015

222 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Encryption, Privacy, & Authentication

Chris R

Chris H

Mindy C

Project Overview

Two ComponentsEvaluation/Authentication

• Setup of each wireless security• Comparison between authentication• Evaluation of encryptions

Cracking• Ease of breaking• Methods used

Authentication

WEP64

WEP128

Authentication

WPA (TKIP, AES) / WPA2 (TKIP/AES)

Security Authentication Time (Seconds)

WEP64 .0047

WEP128 .0049

WPA Personal TKIP 1.013

WPA Personal AES 1.012

WPA2 TKIP/AES 1.013

Authentication

Comparison Between Authentication Periods

Authentication

WPA Personal AES Key

WEP/WPA Notes

WEP key management harder to setup from a user standpointWEP128 Key:

7A08BC60865F25EA684F4801FA

WPA has greater connection overhead / issuesSwitching between WPA and other

securities can cause problems in Windows

Cracking

WEP WEP-64

Packets• Took approximately 40 Min• 530,000 packets

• 416,856 IV’s

Cracking• Took Approximately 1

second• Key: test

WEP WEP-128

• 450,000 IV’s• Failed

• 1.5 Million Packets• 1 Million IV’s

• Success!

WPA

WPA Handshake

• Only one necessary

De-authentication• Aireplay-ng

• Failed

• Manually forced reconnect

Passphrase• 11 Characters

• Dictionary Attack

• Success!

WPA2

WPA 2 Handshake

• Only one needed

De-authentication• Aireplay-ng

• Failed

• Manually Forced reconnect

Passphrase• 12 Letters

• Dictionary Attack• Success!

top related