wep

21
LOGO Wired Equivalent Privacy - WEP -

Upload: nashniv

Post on 22-Nov-2014

1.588 views

Category:

Technology


12 download

DESCRIPTION

 

TRANSCRIPT

Page 1: WEP

LOGO

Wired Equivalent Privacy - WEP -

Page 2: WEP

Wired Equivalent Privacy (WEP)

IntroductionOverviewAuthenticationEncryptionDecryptionRecommendsQ&A

Page 3: WEP

Introduction

A wired LAN : physical security

A wireless LAN : radio waves environments

Page 4: WEP

Introduction (Cont)

Introduced in1997Bring the security of wired to wireless

networkThe first and most used-widely algorithm

for wireless network

Page 5: WEP

Ways to Attack

Passive Attacks (Sniffer) Hack WEP Hack WPA, WPA2 Sniffer Packets

Page 6: WEP

Ways to Attack (Cont)

Active Attacks

Page 7: WEP

Ways to Attack (Cont)

Jamming Attacks

Page 8: WEP

Ways to Attack (Cont)

Man In Middle Attacks

Page 9: WEP

Overview

Protect data privacy WEP (Wired Equivalent Privacy)

Protect data integrity CRC (Cyclic Redundancy Check)

Page 10: WEP

Overview (Cont)

Provide authentication and encryptionAll rely on share keyUses RC4 for encryption

Page 11: WEP

Overview (Cont)

Discard wrong framesUses ICV (Integrity Check Value)

Page 12: WEP

Authentication

Open System AuthenticationShared Key Authentication

Page 13: WEP

Shared Key Authentication

Page 14: WEP

Encryption

Page 15: WEP

Transmission Data

Page 16: WEP

Decryption

Page 17: WEP

XOR

A B A XOR B

1 1 0

1 0 1

0 1 1

0 0 0

Page 18: WEP

What’s Problem ???

IV : 24 bit, small, plain text, staticIV : a part of the RC4 encryption keyICV : not encrypted

Data integrity : not safe

Page 19: WEP

Breaking the Authentication

Collecting :–Clear-text challenge–Encrypted text

Compute the RC4 key

Page 20: WEP

Recommends

Avoid WEP, use WPA or WPA2Don’t use a weak keyChange key periodicallyUses tools

Page 21: WEP

Q&A