Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
WLAN 802.11
Part 2
Esp. Ing. Fernando Boiero
Wireless Security
Maestría en Ciber-Seguridad
[email protected]
WEP: Wired Equivalent Privacy
• Enables:
– Communication between authorized wireless clients
– Association of authorized wireless clients to an Access
Point (AP)
• Uses shared encryption keys
• The key is shared between wireless clients and an
AP
• WEP algorithm can be implemented in HW or SW
• It can be exported outside US
• Key sizes: 64, 128, 152, 256 bits
IV Seed
IV
Seed
II PRNG Key Sequence IV
Ciphertext
XOR
Plaintext II
Integrity Algorithm Integrity Check
Value (ICV)
802.2 SNAP Service Access Point (SAP) 0xaa 0xaa 0x00 0x00 0x00 0x00 0x80 0x00
802.11 Data
Hdr
24 bits
• Table-based attacks
– Having a table of all possible IV’s and their
corresponding key sequencesTable-based attacks
• To overcome vulnerabilities
– Use VPN
– Authenticate clients centrally through RADIUS
– Use at least 128-bit key
• Other security measures:
– Message Integrity Check (MIC)
– Use of Advanced Encryption Standard (AES)
algorithms
– WEP Key hashing (Temporal Key Integrity Protocol,
TKIP)
• WPA:
– TKIP: employs a per-packet key, meaning that it
dynamically generates a new 128-bit key for each packet
– Message Integrity Check (MIC): Michael
• WPA2 (IEEE 802.11i-2004):
– CCMP: AES based
• Target users:
– WPA-Personal: WPA-PSK (pre-shared key): for small and
home office
– WPA-Enterprise: WPA-802.1X. Uses EAP.
802.11 Association
EAP/802.1X/RADIUS
Authentication
4-Way Handshake
Data Communication
• VPN
• Specific VPN client software
• Authentication with user ID and dynamic
password