by sean fisk. not a new technology inherently insecure in recent years, increased popularity

19
Wireless Encryption Schemes By Sean Fisk

Upload: kerrie-matthews

Post on 24-Dec-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Wireless Encryption SchemesBy Sean Fisk

Page 2: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Wireless Communication Not a new technology Inherently insecure In recent years, increased popularity

Page 3: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Encryption Symmetric key Public key

Page 4: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Symmetric Key Cryptography

Only known type until 1976 Shared secret Secure exchange

Page 5: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Symmetric Key Ciphers Block cipher

• Fixed length• Joining protocols

Stream cipher• Variable length

Page 6: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Asymmetric Key Public key

• Diffie and Hellman in 1976• Message is encrypted with public key• Can only be decrypted with private key

Page 7: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Public Key Security Computational complexity of

mathematical problems Diffie-Hellman

• Discrete logarithm problem Rivest, Shamir, and Adleman (RSA)

• Integer factorization problem

Page 8: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Combined Use Public key encryption is much slower

than symmetric key encryption Diffie-Hellman Key Exchange protocol

Page 9: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Wired Equivalent Privacy “The main intention of the WEP was

not to provide a level of security superior to or higher than that of a wired LAN, but equivalent to it.” (Bulbul, Batmaz and Ozel)

Page 10: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

WEP Encryption Rivest’s Cipher 4 (RC4)

• 64-bit 40-bit WEP key 24-bit Initialization Vector

Cyclic Redundancy Code (CRC)

Page 11: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

WEP Weaknesses CRC not intended for message

integrity Key too short Key as direct input to cipher Initialization vector

• Interesting values

Page 12: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Wi-Fi Protected Access Run on same hardware Temporal Key Integrity Protocol (TKIP) Still uses RC4 cipher

• 128-bit key Message Integrity Code replaces CRC Exstensible Authentication Protocol

• Uses public key encryption

Page 13: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

WPA Weaknesses Continuation of RC4 cipher

• First few bytes are strongly non-random (Fluhrer, Mantin, Shamir)

Page 14: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Robust Security Networks Also known as WPA2 Advanced Encryption Standard

• Joined with CCMP Continues use of EAP

Page 15: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Encryption Standards Data Encryption Standard Advanced Encryption Standard Standardized by National Institute of

Standards and Technology (NIST)

Page 16: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Data Encryption Standard Symmetric, block cipher 56-bit key Feistel function “In 1999, the Electronic Frontier

Foundation’s ‘Deep Crack’ machine, in combination with distributed.net, successfully solved RSA’s DES Challenge III in 22 hours and 15 minutes.” (RSA Labs)

Triple DES

Page 17: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Advanced Encryption Standard

Public competition• 5 year process• 15 ciphers• Winner: Rijndael by Daemen and Rijmen

Symmetric, block cipher 128, 192, or 256-bit key

Page 18: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

Virutal Private Networking End-to-end encryption Trusted endpoints Wireless hotspots

Page 19: By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity

References Bulbul, Halil Ibrahim, Ihsan Batmaz and Mesut Ozel.

"Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols

dlaverty. WPA vs WPA2 (802.11i): How your Choice Affects your Wireless Network Security.

Fluhrer, Scott, Adi Shami and Itsik Mantin. Weaknesses in the Key Scheduling Algorithm of RC4.

Masadeh, S.R., et al. "A comparison of data encryption algorithms with the proposed algorithm: Wireless security.“

National Institute of Standards and Technology. "FIPS 197 - Advanced Encryption Standard.“

RSA Labs. 2010. 31 January 2011 <http://www.rsa.com/rsalabs/node.asp?id=2100>.