802.11 Security - Wired Equivalent Privacy (WEP) : by Shruthi B Krishnan
802.11 Security - Wired Equivalent Privacy (WEP) : by Shruthi B Krishnan
802.11 Security - Wired Equivalent Privacy (WEP) : by Shruthi B Krishnan
11 Security –
Wired Equivalent
Privacy (WEP)
By
Shruthi B Krishnan
Agenda for the presentation
Introduction
802.11 Wireless LAN – brief description
Goals of WEP
Confidentiality in WEP
Data Integrity in WEP
Access Control in WLANs
Security loopholes and attacks on WEP
Lessons to be learnt
Introduction
Access Points
Wireless Medium
Mobile stations
Mobile stations
Stations
Wireless medium
Access Points
Distribution System
Basic Service Set (BSS)
Extended Service set (ESS)
802.11 Wireless LAN – brief description (cont’d)
Network services
Distribution System services
Association
Disassociation
Reassociation
Station services
Authentication
Deauthentication
Privacy
Inside the
Outside the
network
network
Successful Association/
Successful Authentication Reassociation
Deathentication Disassociation
Authenticated and
Unauthenticated and Authenticated and Associated
Unassociated Unassociated
Goals of WEP
Confidentiality
Uses stream cipher RC4 for encryption
Data Integrity
Uses cyclic redundancy check
Access control
Shared key authentication
Confidentiality in WEP
Plaintext
+ Ciphertext
KEY Keystream
IV
Confidentiality in WEP – (cont’d)
WEP keys and Initialization vector (IV)
40 or 104 bit
key
Plaintext CRC-32
IV RC4
Plaintext ICV
Challenge text, R
Challenge text, R1
Keystream = R1 + C1
Challenge text, R2
Plaintext
Ciphertext
+
+ Keystream +
Ciphertext + Plaintext
Plaintext
Improper IV management
IV-space is small
Implementation dependent
Sent in clear
Recovery of plaintexts
Δ = Plaintext + Plaintext
Δc = ICV + ICV
Plaintext ICV
Δ + + Δc
Plaintext ICV
Attacker
Change
destination
address
Security loopholes and attacks on WEP - (cont’d)
Attacks exploiting the Access Points
TCP ACK
Message
Mobile station with flipped
Access Point
bits
Intercepted
ciphertext with
flipped bits TCP ACK
History of wireless
http://www.ac.aup.fr/a38972/final_projectIT338/history.html