You are on page 1of 50

*

Nur Andini
Raditiana Patmasari
Bachelor Degree of Telecommunication Engineering
School of Electrical Engineering
Telkom University
Cryptography and Network Security

Knowing and understanding application of


cryptography on computer network security

Knowing and understanding application of


cryptography on WLAN security

Knowing and understanding application of


cryptography on GSM

*
Cryptography and Network Security

1.
2.
3.
4.

Introduction
WEP
WPA

WPA2

*
Cryptography and Network Security

*
Cryptography and Network Security

IEEE 802.11

IEEE 802.11i

Wireless
Local Area
Network
(WLAN)

WLAN
Security

*
Cryptography and Network Security

IBSS

BSS

ESS

Independent
Basic
Service Set

Basic
Service Set

Extended
Service Set

*
Cryptography and Network Security

*
Cryptography and Network Security

*
Cryptography and Network Security

*
Cryptography and Network Security

Encryption

Segmentation

AAA

*
Cryptography and Network Security

10

RC4

Rons Code or Rivests Cipher


Stream cipher
Protecting internet traffic

AES

Advanced Encryption standard


Block cipher
Protecting WLAN data

*
Cryptography and Network Security

11

Authentication

Accounting

Authorization

*
Cryptography and Network Security

12

Authentication
It is the first step
of connecting user
to the network.

It is to verify the
identity of user.

*
Cryptography and Network Security

13

Authorization
It is the next step
after
authentication.

It is to grant user
the access of
network resources
and services.

*
Cryptography and Network Security

14

Accounting
It is the next
step after
authorization.

It is to track the
use of network
resource.

*
Cryptography and Network Security

15

It is to segment users into groups.


After authorization, user is
restricted in case of resource and
coverage.

*
Cryptography and Network Security

16

*
Cryptography and Network Security

17

Encryption
process on
Layer 2

64-bit
WEP

RC4 is
used

*
Cryptography and Network Security

18

Confidentiality

Access
control

Integrity

*
Cryptography and Network Security

19

Confidentiality
Providing data privacy
Encrypting the data using
RC4

*
Cryptography and Network Security

20

Authentication

Access control

Open System

Authorization

Shared-Key

Granting user the


access of network
resources and services

*
Cryptography and Network Security

21

Authentication
Open System

Pre-Shared

Verifiying user
identitywithout user
verification.

Verifiying user identitywith


user verification using
static key.

*
Cryptography and Network Security

22

Integrity
Providing Integrity Check
Value (ICV)
Preventing the data
modification

*
Cryptography and Network Security

23

Plaintext
Message
Cyclic Redundancy Check (CRC)
Integrity Check Value

*
Cryptography and Network Security

24

Key

Static
key

Initialization
Vector (IV)

RC4

Static key

Keystream

*
Cryptography and Network Security

IV

25

64-bit WEP
key

24-bit
Initialization
Vector (IV)

40-bit static
key

*
Cryptography and Network Security

26

Plaintext
XOR

Keystream

Ciphertext

*
Cryptography and Network Security

27

IV

Ciphertext

*
Cryptography and Network Security

28

Ciphertext

IV collision
attack

Bitflipping
attack

Weak
key
attack

Re-injection
attack

*
Cryptography and Network Security

29

IV collision attack
224 IV combination

IV is generated on every
frame

It is easy to get the secret key when IV


collision occurs

*
Cryptography and Network Security

30

Weak key attack


Weak keys are
generated

RC4

It is easy to get secret key by


recovering IV

*
Cryptography and Network Security

31

Re-injection attack

Injecting many IVs to


accelerate IV flow

*
Cryptography and Network Security

32

Bit-flipping attack

ICV is weak

*
Cryptography and Network Security

33

*
Cryptography and Network Security

34

Improving
encryption
method on
WEP

Improving
data
protection

Improving
access
control

*
Cryptography and Network Security

35

Confidentiality

Access
control

Integrity

*
Cryptography and Network Security

36

Confidentiality

Encrypting the data using


Temporal Key Integrity
Protocol (TKIP)

RC4

*
Cryptography and Network Security

37

TKIP
128-bit static key

Providing key hierarchy


and key management
Removing predictability of
static key

*
Cryptography and Network Security

38

Authentication

Access control
Granting user the access of network resources and
services

*
Cryptography and Network Security

39

Authentication
Personal
Pre-Shared key
(PSK)

Enterprise
802.1X

*
Cryptography and Network Security

40

Extensible
Authentication
Protocol (EAP)

Integrity

Preventing data modification


Message Integrity Check
(MIC)

Michael

*
Cryptography and Network Security

41

*
Cryptography and Network Security

42

WPA

Advanced
Encryption
Standard (AES)

WPA2

*
Cryptography and Network Security

43

Confidentiality

Encrypting the data using


Counter mode with Cipher Block
Chaining-Message Authentication
Code (CCMP)

AES

*
Cryptography and Network Security

44

AES
128-bit key

128-bit
plaintext block

*
Cryptography and Network Security

45

Authentication

Access control
Granting user the access of network resources and
services

*
Cryptography and Network Security

46

Authentication
Personal
Pre-Shared key
(PSK)

Enterprise
802.1X

*
Cryptography and Network Security

47

Extensible
Authentication
Protocol (EAP)

Integrity

Preventing data modification


8-byte Message
Integrity Check (MIC)

Michael

*
Cryptography and Network Security

48

* CWNA Certified Wireless Network

Administrator by David D. Coleman and David


A. Westcott

* Wi-Fi Protected Access by Wi-Fi Alliance


* Cryptography and Network Security by
William Stallings

*
Cryptography and Network Security

49

*
Cryptography and Network Security

50

You might also like