Mobile and Wireless Communication Security By Jason Gratto.

24
Mobile and Wireless Communication Security By Jason Gratto

Transcript of Mobile and Wireless Communication Security By Jason Gratto.

Page 1: Mobile and Wireless Communication Security By Jason Gratto.

Mobile and Wireless Communication Security

By Jason Gratto

Page 2: Mobile and Wireless Communication Security By Jason Gratto.

WEP (Wired Equivalent Privacy)

Intended to provide confidentiality Key size:40 bits Key distribution: Manual Meant to protect wireless communication

from eavesdropping Also meant to prevent unauthorized access

to wireless network

Page 3: Mobile and Wireless Communication Security By Jason Gratto.

Goals of WEP

Access Control Data Integrity Confidentiality

Page 4: Mobile and Wireless Communication Security By Jason Gratto.

Protocol of WEP

Uses a secret key between the computer and the access point– The secret key is used to encrypt the packets– No standard for sharing the key but in practice a

single key is shared between all of the computers and access points.

Page 5: Mobile and Wireless Communication Security By Jason Gratto.

WEP - Procedure

Generates a checksum Generates a keystream with a chosen IV

(Initialization Vector) v with RC4 XOR between message/checksum and the

keystring Transmits the v and the ciphertext

Page 6: Mobile and Wireless Communication Security By Jason Gratto.

WEP – Procedure

Page 7: Mobile and Wireless Communication Security By Jason Gratto.

WEP - Defenses

Integrity Check (IC)– Used to ensure packet wasn’t modified in transit

Initialization Vector (IV)– Used to avoid encrypting two ciphertexts with the

same key stream– Used to augment the shared key and produce a

different RC4 for each packet

Page 8: Mobile and Wireless Communication Security By Jason Gratto.

WEP – Vulnerabilities

ICV insecure– ICV is a algorithm for creating the checksum, based on

CRC32 and can be modified to match the contents of the message.

IV key reuse– Because a small IV value is used, IV values end up being

reused, compromising the security.

Authentication forging– Using a recovered key stream and IV the authentication can

be forged.

Page 9: Mobile and Wireless Communication Security By Jason Gratto.

WEP – Attack types

Passive– Eavesdropping on wireless traffic

Active– Constructing it’s own encrypted packets when plaintext is

known Active from both sides

– Constructing it’s own encrypted packets when only header is known by guessing.

Dictionary building– Computing the key stream using a decryption table

Page 10: Mobile and Wireless Communication Security By Jason Gratto.

Wi-Fi Protected Access (WPA)

Key size: 128 bits Hash method: ICV, MICHAEL Key distribution: TKIP (Temporal Key Integral

Protocol) Inclusion of EAP certification for enterprise

versions of WPA

Page 11: Mobile and Wireless Communication Security By Jason Gratto.

MICHAEL

MICHAEL generates a MIC (Message Integrity Code)– 8 bits long– Placed between the data and the ICV

Page 12: Mobile and Wireless Communication Security By Jason Gratto.

TKIP

Made to address security problems with WEP

Looks to client’s configuration to determine what kind of key to use

Sets a unique default key for each client

Page 13: Mobile and Wireless Communication Security By Jason Gratto.

TKIP - Defenses

Implements a key mixing function that combines a secret key with an IV before performing RC4 initialization

If packets are received out of order, they are rejected by the access point

Implements the MICHAEL integrity check to prevent forged packets from being accepted

Page 14: Mobile and Wireless Communication Security By Jason Gratto.

Extensible Authentication Protocol (EAP)

Is a transmission method and framework for authentication protocols– Works with many other authentication protocols

such as RADIUS and Kerberos

Uses a variety of different transport methods

Page 15: Mobile and Wireless Communication Security By Jason Gratto.

EAP

Originally designed for wired connections– To be used in a wireless environment, the

“tunneled” EAP method was created, wrapping the EAP in a stronger encrypted EAP

Common transport methods– EAP-TLS (Transport Layer Security)– EAP-TTLS (Tunneled Transport Layer Security)– PEAP (Protected EAP)– LEAP (Light EAP)

Page 16: Mobile and Wireless Communication Security By Jason Gratto.

EAP Types

PEAP– Interior MSCHAPv2 inside a secure TLS tunnel

EAP-TTLS– Interior EAP-MD5 inside a secure TLS tunnel

LEAP– Modified version of MSCHAP– Vulnerable to dictionary attacks

Page 17: Mobile and Wireless Communication Security By Jason Gratto.

WPA –Vulnerabilities

Denial of Service– Any time forged and unauthorized data is

detected, it shuts the access point down for 60 seconds

Because of this it is easy to shut down access points using little network activity

Page 18: Mobile and Wireless Communication Security By Jason Gratto.

WPA2

Updated version of WPA Uses AES encryption and allows use of

RADIUS (Remote Authentication Dial In User Service) authentication protocol

Page 19: Mobile and Wireless Communication Security By Jason Gratto.

RADIUS

Protocol for communication between Network Access Server (NAS) and a remote authentication server

Requires clients and servers

Page 20: Mobile and Wireless Communication Security By Jason Gratto.

RADIUS

Data needed for authenticaiton– User data

IP Name or address Shared secret key

– User information Username and password

– Session information Speed, port, NAS ID

Page 21: Mobile and Wireless Communication Security By Jason Gratto.

RADIUS – Database

The database can be stored in a number of different ways– A text file– Password file– Netware directory

The database can authenticate in a number of ways as well– Username/password– SecurID Token Card

Page 22: Mobile and Wireless Communication Security By Jason Gratto.

RADIUS

After authentication is requested, the RADIUS server either accepts or rejects the NAS based on the following– Session timers– Filters– IP Address– IDSN Session Parameters

Page 23: Mobile and Wireless Communication Security By Jason Gratto.

RADIUS

ISP User Database

ISP Modem Pool

User dials modem pool and establishes connection

UserID: bobPassword: ge55gep

UserID: bobPassword: ge55gepNAS-ID: 207.12.4.1

Select UserID=bob

Bobpassword=ge55gepTimeout=3600[other attributes]

Access-AcceptUser-Name=bob[other attributes]

Framed-Address=217.213.21.5

The Internet

ISP RADIUS Server

Internet PPP connection established

ISP User Database

ISP Modem Pool

User dials modem pool and establishes connection

UserID: bobPassword: ge55gep

UserID: bobPassword: ge55gepNAS-ID: 207.12.4.1

Select UserID=bob

Bobpassword=ge55gepTimeout=3600[other attributes]

Access-AcceptUser-Name=bob[other attributes]

Framed-Address=217.213.21.5

The Internet

ISP RADIUS Server

Internet PPP connection established

Page 24: Mobile and Wireless Communication Security By Jason Gratto.

Sources

http://www.cs.fsu.edu/~yasinsac/group/slides/cubukcu.pdf

http://islab.oregonstate.edu/koc/ece478/05Report/Kalina.ppt

http://its.ndsu.edu/fileadmin/www.its.ndsu.edu/pdfs/Wireless_EAP.pdf

http://www.ceenet.org/workshops/lecture98/richard/2-radius/index.htm