Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
141 views29 pages

Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that aims to provide confidentiality and integrity of data during transmission. However, WEP has significant flaws that undermine its cryptographic security. It uses the RC4 stream cipher and relies on a shared static key between devices, allowing an attacker to decrypt traffic by intercepting packets encrypted with the same keystream. WEP also uses a weak integrity check via cyclic redundancy check that does not protect against packet modification. These issues, along with problems in key management and reuse of initialization vectors, make traffic encrypted with WEP vulnerable to interception and decryption with relative ease.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views29 pages

Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that aims to provide confidentiality and integrity of data during transmission. However, WEP has significant flaws that undermine its cryptographic security. It uses the RC4 stream cipher and relies on a shared static key between devices, allowing an attacker to decrypt traffic by intercepting packets encrypted with the same keystream. WEP also uses a weak integrity check via cyclic redundancy check that does not protect against packet modification. These issues, along with problems in key management and reuse of initialization vectors, make traffic encrypted with WEP vulnerable to interception and decryption with relative ease.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

WiredEquivalentPrivacy(WEP) Wired Equivalent Privacy (WEP)

Wireless networks rely on an open medium Wirelessnetworksrelyonanopenmedium Withanopennetworkmedium,unprotected traffic can be seen by anybody canbeseenbyanybody Guardingagainsttrafficinterceptionisthe domainofcryptographicprotocols d i f hi l

10/14/2008

GirishKumarPatnaik

CryptographicBackgroundtoWEP Cryptographic Background to WEP


To protect data WEP requires the use of the Toprotectdata,WEPrequirestheuseofthe RC4cipher,whichisasymmetric (secretkey) streamcipher stream cipher Astreamcipherusesastreamofbits,called thekeystream the keystream

10/14/2008

GirishKumarPatnaik

CryptographicBackgroundtoWEP Cryptographic Background to WEP

10/14/2008

GirishKumarPatnaik

CryptographicBackgroundtoWEP Cryptographic Background to WEP


Moststreamciphersoperatebytakinga ost st ea c p e s ope ate by ta g a relativelyshortsecretkeyandexpandingitintoa pseudorandomkeystream thesamelengthas themessage. h Thepseudorandomnumbergenerator(PRNG)is asetofrulesusedtoexpandthekeyintoa t f l dt d th k i t keystream. To recover the data both sides must share the Torecover thedata,bothsidesmustsharethe samesecretkeyandusethesamealgorithmto expandthekeyintoapseudorandomsequence. p y p q
10/14/2008 GirishKumarPatnaik 5

CryptographicBackgroundtoWEP Cryptographic Background to WEP

10/14/2008

GirishKumarPatnaik

WEPCryptographicOperations WEP Cryptographic Operations


Communications security has three major Communicationssecurityhasthreemajor objectives
Confidentiality isthetermusedtodescribedata y thatisprotectedagainstinterceptionby unauthorizedparties. I Integrity meansthatthedatahasnotbeen i h h d h b modified. Authentication underpins any security strategy underpinsanysecuritystrategy becausepartofthereliabilityofdataisbasedon itsorigin.
10/14/2008 GirishKumarPatnaik 7

WEPCryptographicOperations WEP Cryptographic Operations


Usersmustensurethatdatacomesfromthe Use s ust e su e t at data co es o t e sourceitpurportstocomefrom. y p Systemsmustuseauthenticationtoprotectdata appropriately. Authorizationandaccesscontrolareboth implementedontopofauthentication. Beforegrantingaccesstoapieceofdata,systems mustfindoutwhotheuseris(authentication) t fi d t h th i ( th ti ti ) andwhethertheaccessoperationisallowed (authorization). (authorization)
10/14/2008 GirishKumarPatnaik 8

WEPCryptographicOperations WEP Cryptographic Operations


WEP provides operations that attempt to meet WEPprovidesoperationsthatattempttomeet theseobjectives,thoughtheyoftenfailunder seriousscrutinyorattack. serious scrutiny or attack Framebodyencryptionsupports confidentiality. confidentiality Anintegritychecksequenceprotectsdatain transitandallowsreceiverstovalidatethatthe i d ll i lid h h receiveddatawasnotalteredintransit.
10/14/2008 GirishKumarPatnaik 9

WEPDataProcessing WEP Data Processing


Confidentialityandintegrityarehandled Co de t a ty a d teg ty a e a d ed simultaneously yp g Beforeencryption,theframeisrunthroughan integritycheckalgorithm,generatingahash calledanintegritycheckvalue(ICV) TheICVprotectsthecontentsagainsttampering byensuringthattheframehasnotchangedin transit. transit TheframeandtheICVarebothencrypted,so theICVisnotavailabletocasualattackers. the ICV is not available to casual attackers
10/14/2008 GirishKumarPatnaik 10

WEPDataProcessing WEP Data Processing

10/14/2008

GirishKumarPatnaik

11

WEPDataProcessing
Asinput,WEPrequiresthreeitems:
Thepayload tobeprotected,whichcomesfromthe upperlayerprotocolstack. l l k Asecretkey,usedinframeencryption.Dependingon implementation,keysmaybespecifiedasastringof implementation, keys may be specified as a string of keybits,orbykeynumber.WEPallowsfourkeystobe storedsimultaneously. A i iti li ti Aninitializationvector,usedalongwiththesecretkey t d l ith th tk inframetransmission.

After processing WEP has a single output: Afterprocessing,WEPhasasingleoutput:


Anencryptedframe,readyfortransmissionoveran untrusted networkwithenoughinformationtoenable decryptionattheremoteend.
10/14/2008 GirishKumarPatnaik 12

TypesofWEPkeys Types of WEP keys


Mappedkeysprotecttrafficbetweenaparticular sourceandreceiver. Mappedkeysaresometimesreferredtoasunicast keysorstationkeysbecausetheyarewell suitedto keys or station keys because they are wellsuited to protectunicast traffic Defaultkeys(broadcastkeys)areusedwhenno mappingrelationshipexistsbetweentwo802.11 mapping relationship exists between two 802 11 stations. Defaultkeysareforbroadcastandmulticastframes becausegroupaddressesrepresentmultiplestations b dd li l i andthereforecannotsupportkeymapping relationships
10/14/2008 GirishKumarPatnaik 13

Manual(static)versusautomatic (dynamic)WEP (d )
InManualkeydistribution,Administratorswere y , responsiblefordistributingasingledefaultkeyto allstationsinthenetwork WEP without any key distribution mechanism is WEPwithoutanykeydistributionmechanismis oftencalledmanualWEPorstaticWEP In dynamic WEP each station uses two keys dynamicWEPeachstationusestwokeys
Oneisakeymappingkey,shared betweenthe stationandaccesspoint,usedtoprotectunicast frames. frames Thesecondkeyisadefaultkey,sharedbyallstations inthesameserviceset,thatprotectsbroadcastand multicastframes. multicast frames
10/14/2008 GirishKumarPatnaik 14

WEPkeynumberingandstorage WEP key numbering and storage


WEP keys have an associated number so that up WEPkeyshaveanassociatednumbersothatup tofourkeysmaybedefinedonan802.11station Each station receives two keys from the access Eachstationreceivestwokeysfromtheaccess point:
a mapping key typically stored as key number 0 amappingkey,typicallystoredaskeynumber0, adefaultkey,typicallystoredaskeynumber1.

Stations use key 0 for protection of unicast Stationsusekey0 forprotectionofunicast traffic,andkey1 forprotectionofbroadcast traffic
10/14/2008 GirishKumarPatnaik 15

WEPkeynumberingandstorage WEP key numbering and storage


Toefficientlyencryptframes,many802.11 o e c e t y e c ypt a es, a y 80 . chipsetsincludeadatastructurecalledthekey cache. Keycachesconsistofmappingsbetweentuples ofthedestinationaddress,thekeyidentifier number,andthebitsofthekeyitself b d th bit f th k it lf Mostchipsetsintendedforuseinstation interfacecardshavefourkeyslots. interface cards have four key slots StaticWEPusesonekeyslot;dynamicWEP solutionsusetwo. solutions use two
10/14/2008 GirishKumarPatnaik 16

WEPEncapsulation
WhenWEPisinuse,theframebodyexpands y g y byeightbytes.
FourbytesareusedforaframebodyIVheader four are used for the ICV trailer areusedfortheICVtrailer

10/14/2008

GirishKumarPatnaik

17

WEPEncapsulation
Whenadefaultkeyisused,theKeyIDsubfield identifiesthedefaultkeythatwasusedto encrypttheframe. t th f Ifakeymappingrelationshipisused,theKeyID subfieldis0. subfield is 0 The6paddingbitsofthelastbytemustbe0. The integrity check is a 32 bit CRC of the data Theintegritycheckisa32bitCRCofthedata frame;itisappendedtotheframebodyand protectedbyRC4. protected by RC4. Theframechecksequenceprotectsthe yp encrypteddata.
10/14/2008 GirishKumarPatnaik 18

ProblemswithWEP Problems with WEP


Cryptographers have identified many flaws in Cryptographershaveidentifiedmanyflawsin WEP Methods of defeating WEP have come from MethodsofdefeatingWEPhavecomefrom everyangle

10/14/2008

GirishKumarPatnaik

19

CryptographicPropertiesofRC4
Reuseofthekeystreamisthemajorweakness inanystreamcipherbasedcryptosystem. in any stream cipherbased cryptosystem Whenframesareencryptedwiththesame RC4keystream,theXORofthetwoencrypted RC4 ke stream the XOR of the t o encr pted packetsisequivalenttotheXORofthetwo plaintextpackets. plaintext packets Byanalyzingdifferencesbetweenthetwo streamsinconjunctionwiththestructureof theframebody,attackerscanlearnaboutthe contentsoftheplaintextframesthemselves.
10/14/2008 GirishKumarPatnaik 20

CryptographicPropertiesofRC4
WEPusestheIVtoencryptdifferentpackets withdifferentRC4keys,theIVispartofthe with different RC4 keys the IV is part of the packetheader WEP incorporates an integrit check b t the WEPincorporatesanintegritycheck,butthe algorithmusedisacyclicredundancycheck (CRC) CRCsarenotcryptographicallysecure Cryptographicallysecureintegritychecksare basedonhashfunctions,whichare unpredictable.
10/14/2008 GirishKumarPatnaik 21

DesignFlawsoftheWEPSystem Design Flaws of the WEP System


Manual key management is a minefield of Manualkeymanagementisaminefieldof problems
rekeying whenever anybody using WEP leaves the rekeyingwheneveranybodyusingWEPleavesthe company Widely distributed secrets tend to become public Widelydistributedsecretstendtobecomepublic overtime Once a user has obtained the WEP keys, sniffing OnceauserhasobtainedtheWEPkeys,sniffing attacksareeasy

10/14/2008

GirishKumarPatnaik

22

DesignFlawsoftheWEPSystem Design Flaws of the WEP System


As standardized static WEP offers a shared Asstandardized,staticWEPoffersashared secretofonly40bits
sensitive data be protected by at least 128 bit keys sensitivedatabeprotectedbyatleast128bitkeys theindustrystandardextendedkeylengthisonly 104bits 104 bits

Streamciphersarevulnerabletoanalysis whenthekeystreamisreused when the keystream is reused


TwoframesthatsharethesameIValmost certainlyusethesamesecretkeyandkeystream certainly use the same secret key and keystream
10/14/2008 GirishKumarPatnaik 23

DesignFlawsoftheWEPSystem
Infrequentrekeyingallowsattackersto assemble(decryptiondictionaries)large collectionsofframesencryptedwiththesame keystreams CRCsarenotcryptographicallysecure Framesreceivedbytheaccesspointwouldbe y p decryptedandthenretransmittedtothe attacker'sstation.
IftheattackerisusingWEP,theaccesspoint wouldhelpfullyencrypttheframeusingthe p y yp g attacker'skey.
10/14/2008 GirishKumarPatnaik 24

KeyRecoveryAttacksAgainstWEP Key Recovery Attacks Against WEP


FluhrerMantinShamir (FMS) attack Fluhrer Mantin Shamir(FMS)attack
thecleartext valueofthefirstbyteofaSNAP headerisknowntobe0xAA. header is known to be 0xAA Becausethefirstcleartext byteisknown,thefirst byteofthekeystream canbeeasilydeducedfrom byte of the keystream can be easily deduced from atrivialXORoperationwiththefirstencrypted byte.

EachweakIVisusedtoattackaparticular byteofthesecretportionoftheRC4key y p y
10/14/2008 GirishKumarPatnaik 25

Keyrecoverydefenses Key recovery defenses


Longer keys are no defense against key Longerkeysarenodefenseagainstkey recoveryattacks One defense adopted by many vendors is to Onedefenseadoptedbymanyvendorsisto avoidusingweakIVs
eachIVtobeusedisfirstcheckedagainsta h IV t b d i fi t h k d i t classifier,andanyweakIVsarereplacedbynon weakIVs. weak IVs Unfortunately,reducingthesizeoftheIVspace maycauseIVre usetohappenearlier. may cause IV reuse to happen earlier.
10/14/2008 GirishKumarPatnaik 26

Keyrecoverydefenses Key recovery defenses


Network administrators have responded to Networkadministratorshaverespondedto keyrecoveryattacksbyusingstronger protocols,suchasthe802.11iprotocols protocols such as the 802 11i protocols

10/14/2008

GirishKumarPatnaik

27

DynamicWEP Dynamic WEP


Allstationsinanetworkshareakeytoencrypt broadcastframes,andeachstationhasits broadcast frames and each station has its ownmappingkeyforunicastframes DynamicWEPusesstrongcryptographic i hi protocolstogeneratekeysandthen distributethem,inencryptedform,over di ib h i df untrustednetworks. WEPkeygenerationtypicallydependsonthe useofacryptographicauthenticationprotocol
10/14/2008 GirishKumarPatnaik 28

DynamicWEP Dynamic WEP


Theautomatickeymanagementofdynamic WEPachievesmuchgreatersecuritythan WEP achieves much greater security than staticWEPbecauseitdramaticallyshortens thelifetimeofakey the lifetime of a key Frameinitializationvectorscanbereused afterakeyrefreshbecausetheycorrespond f k f hb h d totwodifferentWEPseeds.

10/14/2008

GirishKumarPatnaik

29

You might also like