A History of WEP The Ups and Downs of Wireless Security.
-
Upload
preston-summers -
Category
Documents
-
view
213 -
download
1
Transcript of A History of WEP The Ups and Downs of Wireless Security.
![Page 1: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/1.jpg)
A History of WEPThe Ups and Downs of Wireless Security
![Page 2: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/2.jpg)
Wireless Communication Beginnings Early Cordless Phones and Cell Phones
Used same idea as Walkie-Talkies Anyone with a “Scanner” could easily
eavesdrop on calls Used a Spread-Spectrum algorithm to
defeat the traditional “Scanner”
![Page 3: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/3.jpg)
The 802.11 Standard Defines wireless communications
protocols 802.11b, 802.11g, 802.11n common
wireless network protocols Similar to early Cell Phones and
Cordless Phones at the start – no real protection
Can easily find out network names and connect to them
Invent of War Driving!
![Page 4: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/4.jpg)
![Page 5: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/5.jpg)
Early Security Attempts Open Access to Networks – Solution?
Filter the “unique” MAC address of the wireless cards
Problem? Keep a large list of EVERY network card
that can have access No real authentication or check takes
place MAC addresses can be “spoofed”
![Page 6: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/6.jpg)
Introducing WEP W.E.P. – Wired Equivalent Privacy Introduced in September of 1999 First real attempt at securing open
wireless networks Attempted to make the network as
confidential as a traditional wired network Originally used a 40-bit security key,
later expanded to 104-bits, and 232-bits
![Page 7: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/7.jpg)
A Look At WEP
IV – Initialization Vector (24-bits) Key Selected by User Combined to create a seed to generate the
keystream
![Page 8: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/8.jpg)
All Secured Sir……. RC4 is a popular cipher used in many
security applications Problem: RC4 is a stream cipher
Keystream cannot be reused or you can get back the message
24-bit IV has a 50% chance of repeating on a busy network after 5000 IVs generated
Can also capture packets an replay them: poor authentication
![Page 9: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/9.jpg)
Demonstration Time
![Page 10: A History of WEP The Ups and Downs of Wireless Security.](https://reader035.fdocuments.in/reader035/viewer/2022072013/56649e585503460f94b51b34/html5/thumbnails/10.jpg)
After WEP WPA created to use existing hardware Fixes many of the downfalls of WEP Not without its own problems
Uses a password to generate keys Dictionary attack TKIP Algorithm used has flaws
WPA2 developed to fix WPA Made before WPA flaw discovered