Wireless Protocol
Wireless Protocol
Hello Friends…….
First of all please see the Contents which I shall cover: ……….. After covering brief
introduction about three basic WiFi security protocols I shall cover each one by
one. First in this series will be Wired Equivalent Privacy WEP followed by WiFi
Protected Access WPA and WPA2. In last I shall compare WPA and WPA2.
The wireless networking is becoming very popular among large number of internet
users. Because of the popularity of the wireless networking technology, large number
of wireless networking products and protocols are available for the home and business
use. Wireless transmissions are available to authorized users and also to the
unauthorized users like hackers. The IEEE 802.11 standard offers some level of
protection. This protection, known as the Wired Equivalent Privacy (WEP) protocol,
defines a set of instructions and rules by which wireless data can be transmitted over
the airwaves with some amount of security. Wired Equivalent Privacy WEP Protocol
is a basic security feature in the IEEE 802.11 standard, intended to provide
confidentiality over a wireless network by encrypting information sent over the
network. Very soon WEP was replaced by WiFi Protocol Access due a flaw in WEP
of getting cracked in a few minutes with the aid of automated tools.
Wi-Fi Protected Access WPA and WPA2 is a wireless security protocol designed to
address and fix the known security issues in WEP.
Any way this was very brief about basic security techniques used for WiFi.
Now let us see each one by one
From the above objectives, it's clear that WEP was not designed to provide
a high military level
security. The intention was to make it hard to break-in as opposed to
impossible to break-in.
WEP Design Objectives
Reasonably strong
Self-synchronizing
Efficient
Exportable
Optional
WEP
Authentication
o Open System Authentication
o Shared Key Authentication
Encryption
In Open System authentication, the WLAN client need not provide its credentials to the
Access Point during authentication. Any client can authenticate with the Access Point
and then attempt to associate. In effect, no authentication occurs. Subsequently WEP
keys can be used for encrypting data frames. At this point, the client must have the
correct keys.
In Shared Key authentication, the WEP key is used for authentication in a four-step
challenge-response handshake as shown in figure :
access point.
device.
3. The wireless device uses the shared secret key to sign the
shared secret key and verifies the challenge that it has sent
authentication. The same secret key or shared key is used for both
Please see figure which shows step by step implementation of encryption process.
WEP uses RC4 stream cipher to encrypt data between access point and wireless
device. WEP uses 8-bit RC4 and operates on 8-bit values by creating an array with
256 8-bit values for a lookup table. WEP uses CRC for the data integrity and
accordingly performs CRC (Cyclic Redundancy Check) checksum operation on the
plaintext and generates CRC value. This CRC value is concatenated to the plaintext.
The secret key is concatenated to the Initialization Vector(IV) and fed into the RC4.
Based on the secret key and IV, RC4 generates keystream. The keystream and
plaintext+CRC message are XOR'ed together. The result is the ciphertext. The same
Initialization Vector that was used before, is prepended in clear text to the resultant
ciphertext. The Initialization Vector IV + Ciphertext along with the frame headers are
then transmitted over the air.
In this encryption method as we have seen, some part of the secret key is used with
different exposed values, an attacker can generate the secret part by analyzing some
portion of number of bits in the first few bytes of the keystream with relatively less
work. Another problem with WEP is that the secret shared key is concatenated with
the visible IV value. This weakness is known as “IV weakness.
In the beginning it was believed that WEP offers impenetrable resistance to
eavesdroppers and hackers. However, as wireless networks began to grow in
popularity, many crypt analysts and researchers discovered flaws in the original WEP
design. Many believe that there was little peer review performed on the WEP protocol.
Many of the WEP flaws would have been caught in the early design phase if it's
design and implementation specifications had been reviewed thoroughly. For most of
the wireless networking users (especially home users), WEP is the only choice
available until new security mechanisms are added to the IEEE 802.11 standard. But
as people say “something is better than nothing”, even with it's known weaknesses,
WEP is still more effective than no security at all. Atleast it will provide some
security against unauthorized use of one's wireless network and eating up the
bandwidth.
There are many solutions available to overcome the weaknesses of WEP.
Some of them are:
• The bigger size of the Initialization Vector (IV) can be chosen.
• The hashed value of IV can be prepended or appended to the ciphertext
instead of the
clear text.
• Instead of using CRC checksum, different method can be used for the
data integrity
verification. i.e. Hash functions
• Change secret key regularly, dynamically using secure symmetric key
distribution
protocols.
• Better key management using security handshake protocols .
• New authentication mechanisms using the Extensible Authentication
Protocol (EAP).
cracked in a few minutes with the aid of automated tools. So, instead of just
•
relying on the WEP security alone additional measures must to be taken to
•
Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA).
In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared
that both WEP have been deprecated.
As WPA was an intermediate solution for hardware that could not support WPA2 so to
implement WPA, an interim software-implementable solution was designed, for WEP that
could delay immediate deployment of new hardware. To add support for WPA or WPA2,
some old Wi-Fi access points might need to be replaced or have their firmware upgraded.
WPA sometimes referred to as the draft IEEE 802.11i standard became available in 2003.
WPA2 became available in 2004 and is a commonly known as full IEEE 802.11i or IEEE
802.11i-2004 standard.
WPA is a wireless security protocol designed to address and fix the known security
issues in WEP. WPA provides users with a higher level of assurance that their data
will remain protected by using Temporal Key Integrity Protocol (TKIP) for data
encryption. Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for
WPA. WEP used a 40-bit or 104-bit encryption key that must be manually entered on
wireless access points and devices which does not change. But TKIP employs a per-
packet key, meaning that it dynamically generates a new 128-bit key for each packet and
thus p3revents the types of attacks that compromised WEP.
WPA also includes a message integrity check, which is designed to prevent an attacker
from altering and resending data packets. This replaces the cyclic redundancy check
(CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide a
sufficiently strong data integrity guarantee for the packets it handled. Well tested
message authentication codes existed to solve these problems, but they required too
much computation to be used on old network cards. WPA uses a message integrity
check algorithm called Michael to verify the integrity of the packets.
WPA
WPA is designed to address and fix problems in WEP.
WPA uses Temporal Key Integrity Protocol (TKIP) for data encryption.
WEP used a 40-bit or 104-bit encryption key but TKIP employs a dynamically
generated new 128-bit key for each packet
This 128 bit key prevents the types of attacks that compromised WEP.
WPA also includes a message integrity check to prevent an attacker from altering
and resending data packets by replacing the cyclic redundancy check (CRC) used by
the WEP standard.
WPA uses a message integrity check algorithm called Michael to verify the integrity
of the packets.
No doubt Michael is much stronger than a CRC, but still Researchers have discovered a
flaw in WPA due to reason of limitations of Michael to retrieve the keystream from short
packets to use for re-injection and spoofing.
In order to solve such problems in WPA and to completely implement IEEE 802.11i
protocol, a new wireless security protocol WPA2 is implemented, in which only
authorised users can access a wireless device, with features supporting stronger
cryptography, stronger authentication control, key management, replay attack
protection and data integrity.
WPA2 Technology/Features
Only authorised users can access a wireless device
Features supporting
o stronger cryptography,
o stronger authentication control,
o key management,
o replay attack protection and
o data integrity.
WPA2 Encryption
AES is used instead of TKIP for encryption.
Three steps of algorithm
o In 1st step 128 bit key used to perform 9 rounds,
o In 2nd step 192 bit key performs 11 rounds,
o In 3rd step 256 bit key performs 13 rounds,
Substitutions are performed in each round.
Very effective