security enhancement for wireless communication bassam almogahed

17
Security Enhancement Security Enhancement for Wireless for Wireless Communication Communication Bassam Almogahed Bassam Almogahed

Upload: josephine-matthews

Post on 03-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Security Enhancement for Security Enhancement for Wireless CommunicationWireless Communication

Bassam AlmogahedBassam Almogahed

Almogahed BAlmogahed B 22

AgendaAgenda

IntroductionIntroduction Materials and MethodsMaterials and Methods ResultsResults ConclusionsConclusions RecommendationRecommendation

Almogahed BAlmogahed B 33

IntroductionIntroductionLegitimate users

communicating via wireless networks

Third party interrupting the communication between the two communicators

Alice Bob

Trudy

Trudy

Almogahed BAlmogahed B 44

Station in a network

Wireless Routers

Location A

Location C

Location B

Physical Wireless Settings

Materials and MethodsMaterials and Methods

Almogahed BAlmogahed B 55

Materials and Methods cont’d.Materials and Methods cont’d.

Send through wireless networkLocation A Protocol (location A)

Protocols and Methods

Location C

How Strong is the protocol? Location B

Apply Protocol or Method

Interrupt communication

Test:How efficient is the protocol?

Test

Test

Experiment Process

Almogahed BAlmogahed B 66

Attacks: Attacks: • Man-in-the-Middle AttackMan-in-the-Middle Attack• Replay AttackReplay Attack• Known Plaintext AttackKnown Plaintext Attack• Exhaustive Search AttackExhaustive Search Attack• Chosen Plaintext AttackChosen Plaintext Attack

Materials and Methods cont’d.Materials and Methods cont’d.

Almogahed BAlmogahed B 77

Protocols

Reverse Order of Key

Application

Longer KeyLength

Session Key

Public/Privat e Key

Authentication Protocols and Their Strengthening Strategies

DifferentHash

Functions

HashedMAC(HMAC)

-One Way Hash Function

Longer KeyLength

SymmetricKey

Random Value with Key

ChineseReminderTheory

RepeatedSquaring

EphemeralDiffie-Hellman

Buy SmartDraw!- purchased copies print this document without a watermark .

Visit www.smartdraw.com or call 1-800-768-3729.

Materials and Methods cont’dMaterials and Methods cont’d

Almogahed BAlmogahed B 88

Materials and Methods cont’d.Materials and Methods cont’d.

Methods

Cipher BlockChaining(CBC)

Counter Mode(CTR)

Longer KeyLength

Random Value with

Key

Electric Code Book (ECB)

MessageAuthenticationCode(MAC)

Symmetric Key

Integrity Methods and Their Strengthening Strategies

DifferentHash

Function

Hashed MAC(HMAC)

Hash Function

Longer KeyLength

CRC

Buy SmartDraw!- purchased copies print this document without a watermark .

Visit www.smartdraw.com or call 1-800-768-3729.

Almogahed BAlmogahed B 99

Materials and Methods cont’d.Materials and Methods cont’d.

Methods

Longer KeyLength

Random Value with

Key

Public/PrivateKey

Symmetric Key

Confidentiality Methods and Their Strengthening Strategies

MD5 SHA-1

Hash Algorithm

Rivest Cipher(RC4)

Phil Katz(PKZIP)

Stream Cipher

ORYX Cipher

Longer KeyLength

Rivest,Shamir,

Adleman(RSA) Rabin Cipher

Number Theorists are

Us NTRU

Buy SmartDraw!- purchased copies print this document without a watermark .

Visit www.smartdraw.com or call 1-800-768-3729.

Almogahed BAlmogahed B 1010

Materials and Methods cont’d.Materials and Methods cont’d. Recorded DataRecorded Data

• What is the name of the protocol being What is the name of the protocol being tested?tested?

• What is the level of complexity?What is the level of complexity?• Are the legitimate communicators able to Are the legitimate communicators able to

communicate with each other?communicate with each other?• How fast is the transition?How fast is the transition?• Is the communication interrupted?Is the communication interrupted?• Can the protocol be broken using any of the Can the protocol be broken using any of the

attack techniques? If so, which one(s)?attack techniques? If so, which one(s)?• What is the level of security?What is the level of security?• What is the level reliability?What is the level reliability?

Almogahed BAlmogahed B 1111

Materials and Methods cont’dMaterials and Methods cont’d

Ratings

Standards

High Medium High

Medium Low

Low

Secure 261 - 280

key space

241 - 260

key space

221 - 240

key space

20 - 220

key space

Efficient 1Mbps 200kbps 54kbps 11kbps

Complex O(n)2 O(nlogn) O(n) O(log n)

Reliable %0.3< %0.9 < %2 < %10 >

Test components and classifications

Almogahed BAlmogahed B 1212

ResultsResults

Medium Low

Low

High

Medium High

Authentication Protocols Experiment Results

StandardsProtocols

Security Efficiency Complexity Reliability

Public/Private Key

Symmetric Key

Hash Function

Session Key

Almogahed BAlmogahed B 1313

Medium Low

Low

High

Medium High

StandardsMethods

Security Efficiency Complexity Reliability

CRC Check

Symmetric Key

Hash Algorithm

MessageAuthentication

Code (MAC)

Integrity Experiment Results

Results cont’d.

Almogahed BAlmogahed B 1414

Medium Low

Low

High

Medium High

Confidentiality Experiment Results

Standards

Methods

Security Efficiency Complexity Reliability

Symmetric Key

Public/Private Key

Hash Algorithm

Stream Ciphers

Results cont’d.

Almogahed BAlmogahed B 1515

AuthenticationAuthentication• The The public key authenticationpublic key authentication protocol that Genentech protocol that Genentech

currently uses is the only one to rank highly secure, currently uses is the only one to rank highly secure, but this security comes at the price of complexity and but this security comes at the price of complexity and inefficiency. inefficiency.

• The The symmetric keysymmetric key protocol shows high efficiency, but protocol shows high efficiency, but is also very unreliable. is also very unreliable.

• The The session keysession key protocol offers very high efficiency protocol offers very high efficiency and reliability, but lacks security.and reliability, but lacks security.

• The The hash functionhash function protocol has by far the worst protocol has by far the worst overall rating across the board with just mediocre overall rating across the board with just mediocre levels of security, reliability and efficiency. levels of security, reliability and efficiency.

ConclusionsConclusions

Almogahed BAlmogahed B 1616

ConclusionsConclusions IntegrityIntegrity

• The current Genentech integrity method, The current Genentech integrity method, CRCCRC, has , has very low security features although it is very efficient. very low security features although it is very efficient.

• MACMAC shows highest security with highest reliability shows highest security with highest reliability rate among all methods tested.rate among all methods tested.

ConfidentialityConfidentiality• All confidentiality methods tested are mostly secure. All confidentiality methods tested are mostly secure. • The current method, The current method, symmetric keysymmetric key, is very efficient, , is very efficient,

but the least reliable compared to the other three but the least reliable compared to the other three methods. methods.

• Public keyPublic key shows the highest security methods. shows the highest security methods.• stream ciphersstream ciphers shows the best overall combined shows the best overall combined

results.results.

Almogahed BAlmogahed B 1717

RecommendationRecommendation

Combine Combine public keypublic key and and session keysession key protocols for the authentication process. protocols for the authentication process. Use the public key protocol to deliver the Use the public key protocol to deliver the session key used for the rest of the session key used for the rest of the authentication process authentication process

Use the Use the public keypublic key system to encrypt and system to encrypt and compute the message authentication code compute the message authentication code (MAC), which will in turn yield increased (MAC), which will in turn yield increased confidentiality and integrity together in confidentiality and integrity together in one method.one method.