Professional Documents
Culture Documents
Nur Andini
Raditiana Patmasari
Bachelor Degree of Telecommunication Engineering
School of Electrical Engineering
Telkom University
Cryptography and Network Security
*
Cryptography and Network Security
1.
2.
3.
4.
Introduction
WEP
WPA
WPA2
*
Cryptography and Network Security
*
Cryptography and Network Security
IEEE 802.11
IEEE 802.11i
Wireless
Local Area
Network
(WLAN)
WLAN
Security
*
Cryptography and Network Security
IBSS
BSS
ESS
Independent
Basic
Service Set
Basic
Service Set
Extended
Service Set
*
Cryptography and Network Security
*
Cryptography and Network Security
*
Cryptography and Network Security
*
Cryptography and Network Security
Encryption
Segmentation
AAA
*
Cryptography and Network Security
10
RC4
AES
*
Cryptography and Network Security
11
Authentication
Accounting
Authorization
*
Cryptography and Network Security
12
Authentication
It is the first step
of connecting user
to the network.
It is to verify the
identity of user.
*
Cryptography and Network Security
13
Authorization
It is the next step
after
authentication.
It is to grant user
the access of
network resources
and services.
*
Cryptography and Network Security
14
Accounting
It is the next
step after
authorization.
It is to track the
use of network
resource.
*
Cryptography and Network Security
15
*
Cryptography and Network Security
16
*
Cryptography and Network Security
17
Encryption
process on
Layer 2
64-bit
WEP
RC4 is
used
*
Cryptography and Network Security
18
Confidentiality
Access
control
Integrity
*
Cryptography and Network Security
19
Confidentiality
Providing data privacy
Encrypting the data using
RC4
*
Cryptography and Network Security
20
Authentication
Access control
Open System
Authorization
Shared-Key
*
Cryptography and Network Security
21
Authentication
Open System
Pre-Shared
Verifiying user
identitywithout user
verification.
*
Cryptography and Network Security
22
Integrity
Providing Integrity Check
Value (ICV)
Preventing the data
modification
*
Cryptography and Network Security
23
Plaintext
Message
Cyclic Redundancy Check (CRC)
Integrity Check Value
*
Cryptography and Network Security
24
Key
Static
key
Initialization
Vector (IV)
RC4
Static key
Keystream
*
Cryptography and Network Security
IV
25
64-bit WEP
key
24-bit
Initialization
Vector (IV)
40-bit static
key
*
Cryptography and Network Security
26
Plaintext
XOR
Keystream
Ciphertext
*
Cryptography and Network Security
27
IV
Ciphertext
*
Cryptography and Network Security
28
Ciphertext
IV collision
attack
Bitflipping
attack
Weak
key
attack
Re-injection
attack
*
Cryptography and Network Security
29
IV collision attack
224 IV combination
IV is generated on every
frame
*
Cryptography and Network Security
30
RC4
*
Cryptography and Network Security
31
Re-injection attack
*
Cryptography and Network Security
32
Bit-flipping attack
ICV is weak
*
Cryptography and Network Security
33
*
Cryptography and Network Security
34
Improving
encryption
method on
WEP
Improving
data
protection
Improving
access
control
*
Cryptography and Network Security
35
Confidentiality
Access
control
Integrity
*
Cryptography and Network Security
36
Confidentiality
RC4
*
Cryptography and Network Security
37
TKIP
128-bit static key
*
Cryptography and Network Security
38
Authentication
Access control
Granting user the access of network resources and
services
*
Cryptography and Network Security
39
Authentication
Personal
Pre-Shared key
(PSK)
Enterprise
802.1X
*
Cryptography and Network Security
40
Extensible
Authentication
Protocol (EAP)
Integrity
Michael
*
Cryptography and Network Security
41
*
Cryptography and Network Security
42
WPA
Advanced
Encryption
Standard (AES)
WPA2
*
Cryptography and Network Security
43
Confidentiality
AES
*
Cryptography and Network Security
44
AES
128-bit key
128-bit
plaintext block
*
Cryptography and Network Security
45
Authentication
Access control
Granting user the access of network resources and
services
*
Cryptography and Network Security
46
Authentication
Personal
Pre-Shared key
(PSK)
Enterprise
802.1X
*
Cryptography and Network Security
47
Extensible
Authentication
Protocol (EAP)
Integrity
Michael
*
Cryptography and Network Security
48
*
Cryptography and Network Security
49
*
Cryptography and Network Security
50