Professional Documents
Culture Documents
Identity theft
Nontraditional Man-in-the
(MAC
networks middle attacks
spoofing)
Bluetooth,
PDAs (spoofing
Bogus reconfiguration
and eavesdropping) Denial of Network cmds to routers/switches
service (DoS) injection and degrade performance
Security Mechanism
IEEE 802.11 Wireless LAN
Authentication Request
Frame
Authentication Response
Frame
Association Request
Association Response
Open System Authentication
• Provides authentication without performing any type of client
verification.
• It is essentially an exchange of hellos between the client and
the AP.
• It is considered a null authentication because no exchange or
verification of identity takes place between the devices.
• Open System authentication occurs with an exchange of
frames between the client and the AP.
• Wired Equivalent Privacy (WEP) security can be used with
Open System authentication; however, WEP is used only to
encrypt the upper-layer information of data frames and only after
the client station is 802.11 authenticated and associated.
• Because of its simplicity, Open System authentication is also
used in conjunction with more advanced network security
authentication methods such as PSK authentication and 802.1X/
EAP.
Shared Key Authentication Process
WEP Encryption
• Wired Equivalent Privacy (WEP) is an IEEE 802.11 wireless protocol which
provides security algorithms for data confidentiality during wireless
transmissions
• WEP uses a 24-bit initialization vector (IV) to form stream cipher RC4 for
confidentiality and the CRC-32 checksum for integrity of wireless
transmissions
No matter which station (supplicant) logs on, these 2 values are always
the same. Hence, they will always get the same value for the PMK
PSK(Personal)
How WPA Works(Encryption)
• Temporal encryption key transmit address and TKIP sequence counter
(TSC) is used as an input to RC4 algorithm to generate a key stream
• MAC service data unit (MSDU) and message integrity check (MIC) are
combined using Michael algorithm
• The combination of MSDU and MIC is fragmented to generate MAC
protocol data unit (MPDU)
• A 32 bit integrity check value (ICV) is calculate for the MPDU
• The combination of MPDU and ICV is bitwise XORed with key stream to
produce the encrypted data
• The IV is added to the encrypted data to generate MAC frame
How WPA Works(encryption-TKIP)
What is WPA2
• WPA2 provides enterprise and Wi-Fi users with stronger data protection and
network access control
• Provides government grade security by implementing the NIST FIPS 140-2
compliant AES encryption algorithm
WPA2 Personal WPA2 Enterprise
• WPA2 –personal uses a set up • It includes EAP or RADIUS
password (preshared key (PSK) for centralized client
to protect unauthorized authentication using
network access multiple authentication
• In PSK mode each wireless methods such as token
network device encrypts the cards, Kerberos, certificates
network traffic using a 128-bit etc.
key that is derived from a • Users are assigned login
passphrase of 8 to 63 ASCII credentials by a centralized
characters server which they must
present when connecting to
the network
Keys for PSK(Authentication and encryption)
802.1x Authentication(Enterprise-EAP)
Open system
authentication
has taken Controlled and
place already uncontrolled ports
EAPoL Start are blocked
EAPoL Request / Identity The uncontrolled ports Keep in mind that the Radius server
open to allow EAP traffic to could proxy the AD server for
the Radius Server credentials verification
EAPoL Response / Identity
(Username, cert etc…) RADIUS REQUEST ACCESS
Valid username – send
EAP – Challenge Radius – Access
Challenge
Request Challenge
EAP – Challenge Radius – Access Valid username – send
Request Challenge Challenge