159x Filetype PPT File size 0.59 MB Source: www.ecb.torontomu.ca
1.Open System Authentication Establishing the IEEE 802.11 association with no authentication STA AP STA Probe Request Probe Response Open System Authentication Request (STA Identity) Open System Authentication Response Association Request Association Response Security in Wireless LAN (802.11i) CN8816: Network Security 2 2. Wired Equivalent Privacy (WEP) WEP uses shared key authentication STA AP STA Probe Request & Probe Response Shared Key Authentication (1) (STA Identity) Shared Key Authentication (2) Challenge Encrypted(Shared Key Authentication (3) Challenge) Shared Key Authentication (4) (Success/Failure) Association Request & Response Security in Wireless LAN (802.11i) CN8816: Network Security 3 2. Wired Equivalent Privacy (WEP) WEP Encryption uses RC4 stream cipher IV n o IV i Seed Key Stream t RC4 a n e PRNG Cipher t WEP KEY a + Text c n o n C o i t a Plaintext n e t a Message c n o CRC-32 C Integrity Check Value (ICV) Security in Wireless LAN (802.11i) CN8816: Network Security 4 2. Wired Equivalent Privacy (WEP) Several major problems in WEP security The IV used to produce the RC4 stream is only 24-bit long The short IV field means that the same RC4 stream will be used to encrypt different texts – IV collision Statistical attacks can be used to recover the plaintexts due to IV collision The CRC-32 checksum can be easily manipulated to produce a valid integrity check value (ICV) for a false message Security in Wireless LAN (802.11i) CN8816: Network Security 5 3. Robust Security Network (RSN) 802.11i defines a set of features to establish a RSN association (RSNA) between stations (STAs) Enhanced data encapsulation mechanism CCMP Optional: TKIP Key management and establishment Four-way handshake and group-key handshake Enhanced authentication mechanism for STAs Pre-shared key (PSK); IEEE 802.1x/EAP methods Security in Wireless LAN (802.11i) CN8816: Network Security 6
no reviews yet
Please Login to review.