SlideShare a Scribd company logo
Security Issues of IEEE 802.11b Wireless Local Area Networks Issues | Analysis | Suggestions | Solutions | Adaptations Seminar on Security Issues of 802.11b presented on 21-10-2008 by Sreekanth G S, 274, R7, Computer Science, Sree Chitra Thirunal College of Engineering
Quick Note : Local Area Networks need not scale only up to a building or a particular location. Present scenarios represent Local Area Networks connecting offices across the continents using methods such as VPN (Virtual Private Network). Local Area Network Definition Scope Expansion Wireless Local Area Network Difference from conventional LAN Current IEEE Standards Primitivism of IEEE802.11b Scalability of WLAN Hotspots – Wi-Fi (Wireless Fidelity)
Quick Note : 99% of the world’s Wi-Fi network issues are caused by interference and most of them from cordless telephones. This issue is termed as Wi-Fi band exploitation and device makers consortium has repeatedly requested IEEE to issue a new freq. band. Wireless Local Area Network Released – October 1999 Frequency band – 2.4GHz Data rate – 4.5 Mbit/s (Typical) Data rate – 11 Mbit/s (Maximum) Range - ~38m (Indoor) 802.11b devices suffer interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones.
Quick Note : OFDM - Orthogonal Frequency-Division Multiplexing DSSS - Direct-Sequence Spread Spectrum  Mod. – Modulation technique r in.  -  Range Indoor, r out. –  Range Outdoor
Quick Note : Wi-Fi is not an easy word to wireless deployment of LAN or WLAN. Any solution which  addresses all or some of the above mentioned seven security problems need not be  an ideal solution to the deployment problems faced by most of the companies. Seven Security Problems Easy Access “ Rogue” Access Points Unauthorized Use of Service Service and Performance Constraints MAC Spoofing and Session Hijacking Traffic Analysis and Eavesdropping Higher Level Attacks
Quick Note : Our College is an excellent example of Wi-Fi Easy Access. SSID is broadcasted. Key level encryption is used. 1. Easy Acces Wireless LANs are easy to find. All wireless networks need to announce their existence. The information needed to join a network is also the information needed to launch an attack on a network. Your 802.11 network and its parameters are available for anybody with an 802.11 card. Short of moving into heavily-shielded office space that does not allow RF signals to escape, there is no solution for this problem. The best you can do is to mitigate the risk by using strong access control and encryption solutions.
Quick Note : Any Wi-Fi Router (Example: Linksys WRT54GL) can act as a Wireless AP. AP login with Credentials can make Client login without credentials. Management staff “can” go rogue…. 2. “Rogue” Access Points Easy access to wireless LANs is coupled with easy deployment. Any user can run to a nearby computer store, purchase an access point, and connect it to the corporate network without authorization. End users are not security experts, and may not be aware of the risks posed by wireless LANs. Tools like NetStumbler allow network administrators to wander their building looking for unauthorized access points, but it is expensive to devote time to wandering the building looking for new access points.
Quick Note : VPN – Virtual Private Network WEP – Wired Equivalent Privacy n/w – Network 3. Unauthorized Use of Service Nearly all of the access points running with default configurations have not activated WEP (Wired Equivalent Privacy) or have a default key used by all the vendor's products out of the box. Without WEP, network access is usually there for the taking. If you have deployed a VPN to protect the network from wireless clients, it probably has strong authentication capabilities already built-in. For corporate users extending wired networks, access to wireless networks must be as tightly controlled. Strong authentication is a must before granting access to the n/w.
Quick Note : LAN – Local Area Network MAC – Media Access Control (Burned In Address) Access Point – Wireless Service Providing Machine 4. Service and Performance Constraints Wireless LANs have limited transmission capacity. This capacity is shared between all the users associated with an access point. Due to MAC-layer overhead, the actual effective throughput tops out at roughly half of the nominal bit rate. Attackers could also inject traffic into the radio network without being attached to a wireless access point. Addressing performance problems starts with monitoring and discovering them. No enterprise-class wireless network management system has yet emerged.
Quick Note : In cryptography, the  man-in-the-middle attack  is a form of  active eavesdropping in  which the attacker makes independent connections with the victims, relays messages  between them, making them believe that they are talking  directly to each other over  a private connection when in fact the entire conversation is controlled by the attacker. 5. MAC Spoofing and Session Hijacking 802.11 networks do not authenticate frames. Attackers can use spoofed frames to redirect traffic and corrupt ARP tables. Access points are identified by their broadcasts of Beacon frames. You must deploy a cryptographic protocol on top of 802.11 to protect against hijacking. Attackers can, however, easily pretend to be an access point because nothing in 802.11 requires an access point to prove it really is an access point. (Man-in-the-Middle Attack)
Quick Note : SSH – Secure Shell SSL – Secure Socket Layer IPSec – IP (Internet Protocol) Security 6. Traffic Analysis and Eavesdropping 802.11 provides no protection against attacks that passively observe traffic. A great deal has been written about the flaws in WEP. Early WEP implementations are vulnerable to cracking by tools such as AirSnort and WEPCrack. Strong cryptographic solutions like SSH, SSL, and IPSec were designed to transmit data securely over public channels. It protects only the initial association with the network and user data frames.
Quick Note : Many networks have a hard outer shell composed of perimeter security devices that  are carefully configured and meticulously monitored. Inside the shell, though, is a soft,  vulnerable (and tasty?) center. 7. Higher Level Attacks Once an attacker gains access to a wireless network, it can serve as a launch point for attacks on other systems. Wireless LANs can be deployed quickly if they are directly connected to the vulnerable backbone, but that exposes the network to attack. The solution is straightforward in theory: treat the wireless network as something outside the security perimeter, but with special access to the inside of the network.
Quick Note : Access Control – ACL – Access Control Lists Confidentiality – Encryption Algorithms, Cryptography Data Integrity – CRC Checks, Parity Checks, Checksum, MD5 Values WEP and its Functionality WEP’s security goals are Access  control: protecting  the  wireless  network  from unauthorized access.  Confidentiality:  to prevent eavesdropping. Data  integrity:  to  prevent  tampering  with  transmitted messages.
Quick Note : Plaintext = Message + CRC (Cycic Redundancy Check) IV – Initialization Vector XOR – Exclusive OR RC4 – Encryption Method WEP’s security flaws WEP  relies  on  an  encryption algorithm called RC4. Making of Plaintext Generation of RC4 Keystream XOR of Plaintext and Key Making of Ciphertext Sending of Ciphertext with IV
Quick Note : Ciphertext – Incoming Encrypted Message KeyStream – RC4(v,k) where v is IV transmitted with Ciphertext CRC – Cyclic Redundancy Check IV – Initialization Vector WEP’s security flaws (contd…) Stripping out IV Generation of key k Reassembling of keystream XOR with Ciphertext Obtaining of Plaintext
Quick Note : Why do we need Re-Usable Keystream? Why not 256 bits IV? Starting from the beginning? Resetting IV on Initialization? Key Stream Re-Use The IV is only 24 bits long. Exhaustion of IV Field. No other choice but to Re-Use. Two packets will be encrypted using same k and IV. Key Stream Re-Use is a major vulnerability.
Quick Note : Public Key/ Private Key Encryption Model IV – Initialization Vector XOR – 1101 XOR 1001 = 01 RC4 Hacking in Detail Done using two fields, k and IV. Secret Key – k Public Key – IV Secret Key k is constant. Hence, two or more packets are encrypted using same IV. Means, both packets were encrypted in the very same way. They can be XORed to cancel out two key streams. Results in XOR of two original unencrypted packets. Knowing bit stream in one of the packet gives out the other. Hence, key k is identified.
Quick Note : TKIP – Temporal Key Integrity Protocol WPA – Wi-Fi Protected Access IEEE 802.11i-2004 , or  802.11i , is an amendment to the IEEE 802.11 standard  specifying security mechanisms for wireless networks.  Solutions to Key Stream Re-Use Increasing the size of IV field. A 24 bits to 48 bits increase = 16.7 million to 281 trillion IVs. Decreases very likelihood of Key Stream Re-Use. Making secret key ‘k’ dynamic. Improvement to WPA. Implementation of TKIP. Enhancements including per packet key mixing function. Message Integrity Check called Michael. Extended IV with sequencing rules and Re-Keying mech. Mandatory in upcoming 802.11i
Quick Note : KSA – Key Scheduling Algorithm PRGA – Pseudo Random Generation Algorithm A  pseudorandom  process is a process that appears random but is not. RC4 Algorithm RC4 generates a  pseudorandom stream of bits  (a keystream) which, for encryption, is combined with the plaintext using bit-wise exclusive-or; decryption is performed the same way (since exclusive-or is a symmetric operation). To generate the keystream, the cipher makes use of a secret internal state which consists of two parts: A permutation of all 256 possible bytes (denoted "S" below).  Two 8-bit index-pointers (denoted "i" and "j").  The permutation is initialized with a variable length key, typically between 40 and 256 bits, using the  key-scheduling  algorithm (KSA). Once this has been completed, the stream of bits is generated using the  pseudo-random generation algorithm  (PRGA).
Quick Note : Pseudorandom sequences typically exhibit statistical randomness while being  generated by an entirely deterministic causal process. Such a process is easier to  produce than a genuine random one, and has the benefit that it can be used again and  again to produce exactly the same numbers, useful for testing and fixing software. RC4 Algorithm (contd…) The key-scheduling algorithm (KSA) The key-scheduling algorithm is used to initialize the permutation in the array "S". "keylength" is defined as the number of bytes in the key and can be in the range 1 ≤ keylength ≤ 256, corresponding to a key length of 40 – 128 bits. First, the array "S" is initialized to the identity permutation. S is then processed for 256 iterations. for  i  from  0  to  255  S[i] := i  endfor   j := 0  for  i  from  0  to  255  j := (j + S[i] + key[i mod keylength]) mod 256  Swap (S[i],S[j])  endfor
Quick Note : For such applications as cryptography, the use of pseudorandom number generators  is insecure. When random values are required , the goal is to make a  message as hard  to crack as possible, by eliminating or obscuring the parameters used to encrypt the  message from the message itself or from the context in which it is carried. RC4 Algorithm (contd…) The pseudo-random generation algorithm (PRGA) For as many iterations as are needed, the PRGA modifies the state and outputs a byte of the keystream. In each iteration, the PRGA increments  i , adds the value of S pointed to by  i  to  j , exchanges the values of S[ i ] and S[ j ], and then outputs the value of S at the location S[i] + S[j] (modulo 256). Each value of S is swapped at least once every 256 iterations. i := 0  j := 0  while  GeneratingOutput:  i := (i + 1) mod 256  j := (j + S[i]) mod 256  Swap(S[i],S[j])  Output S[(S[i] + S[j]) mod 256] ^ input[i]  endwhile
Quick Note : RC4 Using Streams - WEP, WPA , BitTorrent protocol encryption , Microsoft Point-to- Point Encryption , Secure Sockets Layer , Secure shell , Remote Desktop Client (RDC  over RDP) , Kerberos , SASL Mechanism Digest-MD5 . RC4 Algorithm (contd…) Test Vectors Sample test vectors are provided below: RC4( "Key", "Plaintext" ) == BBF316E8D940AF0AD3  RC4( "Wiki", "pedia" ) == 1021BF0420  RC4( "Secret", "Attack at dawn" ) == 45A01F645FC35B383552544B9BF5  OR In Plain/Text:  Password: Text: Output:  RC4( "24g3", "24z0") == nhnW  RC4( "24g3", "24z2") == nhnU  RC4( "5ybdt", "5ybu8") == XJrkp
Quick Note : L2TP – Layer 2 Tunneling Protocol RADIUS – Remote Authentication Dial In User Service SHA – Secure Hash Algorithm LDAP – Lightweight Directory Access Protocol VPN, Kerberos, IPSec….. Virtual Private Network, a n/w within a n/w. Kerberos Authentication with RADIUS Servers. IPSec Implementations with L2TP. Firewalls, Monitors, Sniffing Detectors. Better Encryption Algorithms like SHA. Round Robin Based Key Modifying Methods. Domain Based Auth Systems. LDAP Authentication Methods. BSSID Usages. Understanding of Security Issues.
 
Thank you for your patience and co-operation. This seminar presentation is also available on  References: IEEEExplore –  http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1345023 Wikipedia -  http://en.wikipedia.org/wiki/802.11   http://en.wikipedia.org/wiki/RC4 Seven Security Problems – O’Reilly Media - http://www.oreillynet.com/pub/a/wireless/2002/05/24/wlan.html?page=1 Based On:  Security issues of the IEEE 802.11b wireless LAN Boland, H.   Mousavi, H.    Carleton University, Ottawa, Ont., Canada IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
Special Thanks To: Subu Surendran Sir, SCT College of Engineering, Trivandrum Students of R7(05-09), SCT College of Engineering, Trivandrum Slideshare Link Unavailable since Text cannot be Edited afrer Uploading. http://www.sreekanth.in [email_address] +91.9446384450
Ad

More Related Content

What's hot (20)

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
phanleson
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh786
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Università Degli Studi Di Salerno
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
phanleson
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh786
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 

Viewers also liked (9)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
IEEEFINALYEARPROJECTS
 
HSTR Seminar
HSTR SeminarHSTR Seminar
HSTR Seminar
Ronald Bartels
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
rahulpandey510
 
wear fin seminar report
wear fin seminar reportwear fin seminar report
wear fin seminar report
flobin
 
Fin presentation
Fin presentationFin presentation
Fin presentation
amit gaur
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
nagu00018
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
IEEEFINALYEARPROJECTS
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
rahulpandey510
 
wear fin seminar report
wear fin seminar reportwear fin seminar report
wear fin seminar report
flobin
 
Fin presentation
Fin presentationFin presentation
Fin presentation
amit gaur
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
nagu00018
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 
Ad

Similar to Security Issues of 802.11b (20)

Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
Shashank Srivastava
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
MD MONIRUZZAMAN
 
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmmWLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
iit2022057
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Wireless security
Wireless securityWireless security
Wireless security
vinay chitrakathi
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
Alok Pandey (AP)
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-is
ssuser5b84591
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
ClubHack
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal
 
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmmWLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
iit2022057
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-is
ssuser5b84591
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
ClubHack
 
Ad

Recently uploaded (20)

Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 

Security Issues of 802.11b

  • 1. Security Issues of IEEE 802.11b Wireless Local Area Networks Issues | Analysis | Suggestions | Solutions | Adaptations Seminar on Security Issues of 802.11b presented on 21-10-2008 by Sreekanth G S, 274, R7, Computer Science, Sree Chitra Thirunal College of Engineering
  • 2. Quick Note : Local Area Networks need not scale only up to a building or a particular location. Present scenarios represent Local Area Networks connecting offices across the continents using methods such as VPN (Virtual Private Network). Local Area Network Definition Scope Expansion Wireless Local Area Network Difference from conventional LAN Current IEEE Standards Primitivism of IEEE802.11b Scalability of WLAN Hotspots – Wi-Fi (Wireless Fidelity)
  • 3. Quick Note : 99% of the world’s Wi-Fi network issues are caused by interference and most of them from cordless telephones. This issue is termed as Wi-Fi band exploitation and device makers consortium has repeatedly requested IEEE to issue a new freq. band. Wireless Local Area Network Released – October 1999 Frequency band – 2.4GHz Data rate – 4.5 Mbit/s (Typical) Data rate – 11 Mbit/s (Maximum) Range - ~38m (Indoor) 802.11b devices suffer interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones.
  • 4. Quick Note : OFDM - Orthogonal Frequency-Division Multiplexing DSSS - Direct-Sequence Spread Spectrum Mod. – Modulation technique r in. - Range Indoor, r out. – Range Outdoor
  • 5. Quick Note : Wi-Fi is not an easy word to wireless deployment of LAN or WLAN. Any solution which addresses all or some of the above mentioned seven security problems need not be an ideal solution to the deployment problems faced by most of the companies. Seven Security Problems Easy Access “ Rogue” Access Points Unauthorized Use of Service Service and Performance Constraints MAC Spoofing and Session Hijacking Traffic Analysis and Eavesdropping Higher Level Attacks
  • 6. Quick Note : Our College is an excellent example of Wi-Fi Easy Access. SSID is broadcasted. Key level encryption is used. 1. Easy Acces Wireless LANs are easy to find. All wireless networks need to announce their existence. The information needed to join a network is also the information needed to launch an attack on a network. Your 802.11 network and its parameters are available for anybody with an 802.11 card. Short of moving into heavily-shielded office space that does not allow RF signals to escape, there is no solution for this problem. The best you can do is to mitigate the risk by using strong access control and encryption solutions.
  • 7. Quick Note : Any Wi-Fi Router (Example: Linksys WRT54GL) can act as a Wireless AP. AP login with Credentials can make Client login without credentials. Management staff “can” go rogue…. 2. “Rogue” Access Points Easy access to wireless LANs is coupled with easy deployment. Any user can run to a nearby computer store, purchase an access point, and connect it to the corporate network without authorization. End users are not security experts, and may not be aware of the risks posed by wireless LANs. Tools like NetStumbler allow network administrators to wander their building looking for unauthorized access points, but it is expensive to devote time to wandering the building looking for new access points.
  • 8. Quick Note : VPN – Virtual Private Network WEP – Wired Equivalent Privacy n/w – Network 3. Unauthorized Use of Service Nearly all of the access points running with default configurations have not activated WEP (Wired Equivalent Privacy) or have a default key used by all the vendor's products out of the box. Without WEP, network access is usually there for the taking. If you have deployed a VPN to protect the network from wireless clients, it probably has strong authentication capabilities already built-in. For corporate users extending wired networks, access to wireless networks must be as tightly controlled. Strong authentication is a must before granting access to the n/w.
  • 9. Quick Note : LAN – Local Area Network MAC – Media Access Control (Burned In Address) Access Point – Wireless Service Providing Machine 4. Service and Performance Constraints Wireless LANs have limited transmission capacity. This capacity is shared between all the users associated with an access point. Due to MAC-layer overhead, the actual effective throughput tops out at roughly half of the nominal bit rate. Attackers could also inject traffic into the radio network without being attached to a wireless access point. Addressing performance problems starts with monitoring and discovering them. No enterprise-class wireless network management system has yet emerged.
  • 10. Quick Note : In cryptography, the man-in-the-middle attack is a form of active eavesdropping in which the attacker makes independent connections with the victims, relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. 5. MAC Spoofing and Session Hijacking 802.11 networks do not authenticate frames. Attackers can use spoofed frames to redirect traffic and corrupt ARP tables. Access points are identified by their broadcasts of Beacon frames. You must deploy a cryptographic protocol on top of 802.11 to protect against hijacking. Attackers can, however, easily pretend to be an access point because nothing in 802.11 requires an access point to prove it really is an access point. (Man-in-the-Middle Attack)
  • 11. Quick Note : SSH – Secure Shell SSL – Secure Socket Layer IPSec – IP (Internet Protocol) Security 6. Traffic Analysis and Eavesdropping 802.11 provides no protection against attacks that passively observe traffic. A great deal has been written about the flaws in WEP. Early WEP implementations are vulnerable to cracking by tools such as AirSnort and WEPCrack. Strong cryptographic solutions like SSH, SSL, and IPSec were designed to transmit data securely over public channels. It protects only the initial association with the network and user data frames.
  • 12. Quick Note : Many networks have a hard outer shell composed of perimeter security devices that are carefully configured and meticulously monitored. Inside the shell, though, is a soft, vulnerable (and tasty?) center. 7. Higher Level Attacks Once an attacker gains access to a wireless network, it can serve as a launch point for attacks on other systems. Wireless LANs can be deployed quickly if they are directly connected to the vulnerable backbone, but that exposes the network to attack. The solution is straightforward in theory: treat the wireless network as something outside the security perimeter, but with special access to the inside of the network.
  • 13. Quick Note : Access Control – ACL – Access Control Lists Confidentiality – Encryption Algorithms, Cryptography Data Integrity – CRC Checks, Parity Checks, Checksum, MD5 Values WEP and its Functionality WEP’s security goals are Access control: protecting the wireless network from unauthorized access. Confidentiality: to prevent eavesdropping. Data integrity: to prevent tampering with transmitted messages.
  • 14. Quick Note : Plaintext = Message + CRC (Cycic Redundancy Check) IV – Initialization Vector XOR – Exclusive OR RC4 – Encryption Method WEP’s security flaws WEP relies on an encryption algorithm called RC4. Making of Plaintext Generation of RC4 Keystream XOR of Plaintext and Key Making of Ciphertext Sending of Ciphertext with IV
  • 15. Quick Note : Ciphertext – Incoming Encrypted Message KeyStream – RC4(v,k) where v is IV transmitted with Ciphertext CRC – Cyclic Redundancy Check IV – Initialization Vector WEP’s security flaws (contd…) Stripping out IV Generation of key k Reassembling of keystream XOR with Ciphertext Obtaining of Plaintext
  • 16. Quick Note : Why do we need Re-Usable Keystream? Why not 256 bits IV? Starting from the beginning? Resetting IV on Initialization? Key Stream Re-Use The IV is only 24 bits long. Exhaustion of IV Field. No other choice but to Re-Use. Two packets will be encrypted using same k and IV. Key Stream Re-Use is a major vulnerability.
  • 17. Quick Note : Public Key/ Private Key Encryption Model IV – Initialization Vector XOR – 1101 XOR 1001 = 01 RC4 Hacking in Detail Done using two fields, k and IV. Secret Key – k Public Key – IV Secret Key k is constant. Hence, two or more packets are encrypted using same IV. Means, both packets were encrypted in the very same way. They can be XORed to cancel out two key streams. Results in XOR of two original unencrypted packets. Knowing bit stream in one of the packet gives out the other. Hence, key k is identified.
  • 18. Quick Note : TKIP – Temporal Key Integrity Protocol WPA – Wi-Fi Protected Access IEEE 802.11i-2004 , or 802.11i , is an amendment to the IEEE 802.11 standard specifying security mechanisms for wireless networks. Solutions to Key Stream Re-Use Increasing the size of IV field. A 24 bits to 48 bits increase = 16.7 million to 281 trillion IVs. Decreases very likelihood of Key Stream Re-Use. Making secret key ‘k’ dynamic. Improvement to WPA. Implementation of TKIP. Enhancements including per packet key mixing function. Message Integrity Check called Michael. Extended IV with sequencing rules and Re-Keying mech. Mandatory in upcoming 802.11i
  • 19. Quick Note : KSA – Key Scheduling Algorithm PRGA – Pseudo Random Generation Algorithm A pseudorandom process is a process that appears random but is not. RC4 Algorithm RC4 generates a pseudorandom stream of bits (a keystream) which, for encryption, is combined with the plaintext using bit-wise exclusive-or; decryption is performed the same way (since exclusive-or is a symmetric operation). To generate the keystream, the cipher makes use of a secret internal state which consists of two parts: A permutation of all 256 possible bytes (denoted "S" below). Two 8-bit index-pointers (denoted "i" and "j"). The permutation is initialized with a variable length key, typically between 40 and 256 bits, using the key-scheduling algorithm (KSA). Once this has been completed, the stream of bits is generated using the pseudo-random generation algorithm (PRGA).
  • 20. Quick Note : Pseudorandom sequences typically exhibit statistical randomness while being generated by an entirely deterministic causal process. Such a process is easier to produce than a genuine random one, and has the benefit that it can be used again and again to produce exactly the same numbers, useful for testing and fixing software. RC4 Algorithm (contd…) The key-scheduling algorithm (KSA) The key-scheduling algorithm is used to initialize the permutation in the array "S". "keylength" is defined as the number of bytes in the key and can be in the range 1 ≤ keylength ≤ 256, corresponding to a key length of 40 – 128 bits. First, the array "S" is initialized to the identity permutation. S is then processed for 256 iterations. for i from 0 to 255 S[i] := i endfor j := 0 for i from 0 to 255 j := (j + S[i] + key[i mod keylength]) mod 256 Swap (S[i],S[j]) endfor
  • 21. Quick Note : For such applications as cryptography, the use of pseudorandom number generators is insecure. When random values are required , the goal is to make a message as hard to crack as possible, by eliminating or obscuring the parameters used to encrypt the message from the message itself or from the context in which it is carried. RC4 Algorithm (contd…) The pseudo-random generation algorithm (PRGA) For as many iterations as are needed, the PRGA modifies the state and outputs a byte of the keystream. In each iteration, the PRGA increments i , adds the value of S pointed to by i to j , exchanges the values of S[ i ] and S[ j ], and then outputs the value of S at the location S[i] + S[j] (modulo 256). Each value of S is swapped at least once every 256 iterations. i := 0 j := 0 while GeneratingOutput: i := (i + 1) mod 256 j := (j + S[i]) mod 256 Swap(S[i],S[j]) Output S[(S[i] + S[j]) mod 256] ^ input[i] endwhile
  • 22. Quick Note : RC4 Using Streams - WEP, WPA , BitTorrent protocol encryption , Microsoft Point-to- Point Encryption , Secure Sockets Layer , Secure shell , Remote Desktop Client (RDC over RDP) , Kerberos , SASL Mechanism Digest-MD5 . RC4 Algorithm (contd…) Test Vectors Sample test vectors are provided below: RC4( "Key", "Plaintext" ) == BBF316E8D940AF0AD3 RC4( "Wiki", "pedia" ) == 1021BF0420 RC4( "Secret", "Attack at dawn" ) == 45A01F645FC35B383552544B9BF5 OR In Plain/Text: Password: Text: Output: RC4( "24g3", "24z0") == nhnW RC4( "24g3", "24z2") == nhnU RC4( "5ybdt", "5ybu8") == XJrkp
  • 23. Quick Note : L2TP – Layer 2 Tunneling Protocol RADIUS – Remote Authentication Dial In User Service SHA – Secure Hash Algorithm LDAP – Lightweight Directory Access Protocol VPN, Kerberos, IPSec….. Virtual Private Network, a n/w within a n/w. Kerberos Authentication with RADIUS Servers. IPSec Implementations with L2TP. Firewalls, Monitors, Sniffing Detectors. Better Encryption Algorithms like SHA. Round Robin Based Key Modifying Methods. Domain Based Auth Systems. LDAP Authentication Methods. BSSID Usages. Understanding of Security Issues.
  • 24.  
  • 25. Thank you for your patience and co-operation. This seminar presentation is also available on References: IEEEExplore – http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1345023 Wikipedia - http://en.wikipedia.org/wiki/802.11 http://en.wikipedia.org/wiki/RC4 Seven Security Problems – O’Reilly Media - http://www.oreillynet.com/pub/a/wireless/2002/05/24/wlan.html?page=1 Based On: Security issues of the IEEE 802.11b wireless LAN Boland, H.   Mousavi, H.    Carleton University, Ottawa, Ont., Canada IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
  • 26. Special Thanks To: Subu Surendran Sir, SCT College of Engineering, Trivandrum Students of R7(05-09), SCT College of Engineering, Trivandrum Slideshare Link Unavailable since Text cannot be Edited afrer Uploading. http://www.sreekanth.in [email_address] +91.9446384450