Академический Документы
Профессиональный Документы
Культура Документы
14 March, 2008
Contents
Wireless network
Security
WAP Wireless Application Protocol.
WEP Encryption and its vulnerabilities.
WPA Overcoming the vulnerabilities of WEP.
Mechanism, Advantages & Limitations of WPA and WPA2.
Wireless Network
WLAN
SKNCOE
SKNCOE
Wi-Fi Security
How do you encrypt your Access Point? There are
several flavors of encryption:
SKNCOE
SKNCOE
Devices come with a default system ID called the SSID (Service Set
Identifier). It is easy for a hacker to find out the default identifier.
Goals
Markup language
Similar to HTML, adapted to mobile devices
Script language
Similar to JavaScript, adapted to mobile devices
Protocol layers
Transport layer, security layer, session layer etc.
WAP Architecture
with WML-Script
WML Encoder CGI
WML Decks
WML- Scripts
WSP/WTP WMLScript
HTTP etc.
Script
Compiler
WTAI
Protocol Adapters Content
Etc.
WAP Specifies
While the secrete keys are common to all the nodes in the wireless
network, the IV is unique to each client.
The only means of sharing this key is publishing this key to a
distribution medium from where each and every user copies it to
the respective user machine which makes it potentially unsafe.
These IV's are 24bits in length and are generated by the wireless
Network just before the data is encrypted.
The IV used is appended to the top of the wireless frame
unencrypted.
Also use of cryptographically weak CRC mechanism further makes
this protocol vulnerable.
WEP
Can you believe that a WEP was cracked in less than a 60
seconds? Its not the safest.
First WEP versions have used the 64-bit shared key. 40 bits are for
a shared secret and 24 bits are for IV initialization vector. IV is
used that receiver could decrypt the frame.
Next improvement of first WEP key was the 128-bit shared WEP
key. With that WEP version 104 bits are used for the shared key and
24 for initialization vector.
Cracking WEP
Limitations of WEP
1) Manual key management is a big security problem.
4) Most users usually do not change their keys. This gives hackers
more time to crack the encryption.
When you take all this into account, you can see that WPA is much
better solution for your wireless network.
20 Information Security - Session IV - Wireless LAN 7/19/2017 SKNCOE
SKNCOE
WEP the same key could be used for weeks, months, or even years
before being changed, with WPA the key is changed with every
user and every frame, providing a target much harder to attack.
This change in the RC4 keys makes the detection these keys by the
automated tools more difficult.
WPA
Then after that access point is waiting for the permission of server.
Then server gives some type encrypted key to access points and
access points gives it to client.
Then after that client gives decrypted key back to the server and if
it is proper then server gives full permission to client and access
points to use the server.
SKNCOE
SKNCOE
SKNCOE
SKNCOE
SKNCOE
SKNCOE
SKNCOE
SKNCOE
3) Has backward compatible WEP support for devices that are not
upgraded.
Disadvantages of WPA
THANKS To,
My Seminar Guide:
Prof P. N. Mahalle.