Wireless LAN Security II: WEP Attacks, WPA and WPA2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Ipsec, SSL, Firewall, Wireless Security
IPSec 1 Outline • Internet Protocol – IPv6 • IPSec – Security Association (SA) – IPSec Base Protocol (AH, ESP) – Encapsulation Mode (transport, tunnel) 2 IPv6 Header • Initial motivation: – 32-bit address space soon to be completely allocated. – Expands addresses to 128 bits • 430,000,000,000,000,000,000 for every square inch of earth’s surface! • Solves IPv4 problem of insufficient address space • Additional motivation: – header format helps speedy processing/forwarding – header changes to facilitate QoS IPv6 datagram format: – fixed-length 40 byte header – no fragmentation allowed 3 IPv6 Header (Cont) Priority: identify priority among datagrams in flow Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data 4 Other Changes from IPv4 • Checksum: removed entirely to reduce processing time at each hop • Options: allowed, but outside of header, indicated by “Next Header” field • ICMPv6: new version of ICMP – additional message types, e.g. “Packet Too Big” – multicast group management functions 5 IPv6 Security – IPsec mandated • IPsec is mandated in IPv6 – This means that all implementations (i.e. hosts, routers, etc) must have IPsec capability to be considered as IPv6-conformant • When (If?) IPv6 is in widespread use, this means that IPsec will be installed everywhere – At the moment, IPsec is more common in network devices (routers, etc) than user hosts, but this would change with IPsec • All hosts having IPsec => real end-to-end security possible 6 IPv6 Security • Enough IP addrs for every imaginable device + Real end-to-end security = Ability to securely communicate from anything to anything 7 IPv6 Security – harder to scan networks • With IPv4, it is easy to scan a network – With tools like nmap, can scan a typical subnet in a few minutes see: http://www.insecure.org/nmap/ – Returning list of active hosts and open ports – Many worms also operate by scanning • e.g. -
Formally Analysing a Security Protocol for Replay Attacks
Formally Analysing a Security Protocol for Replay Attacks Benjamin W. Long School of Information Technology and Electrical Engineering The University of Queensland, 4072, Australia [email protected] Colin J. Fidge School of Software Engineering and Data Communications Queensland University of Technology, 4001, Australia c.fi[email protected] Abstract We are in an age that requires us to follow rigorous devel- opment processes. For example, the Common Criteria [31], The Kerberos-One-Time protocol is a key distribution an international standard for development and evaluation of protocol promoted for use with Javacards to provide secure security systems, requires formal methods to be used in or- communication over the GSM mobile phone network. From der to obtain the highest level of assurance (EAL7). inspection we suspected a replay attack was possible on the In this paper we take advantage of the Object-Z [11] protocol. To check this, we formally specified the proto- specification language and the SAL [9] model checker to col using Object-Z and then analysed its behaviour in the presence of an attacker using the Symbolic Analysis Lab- • present a formal specification of the Kerberos-One- oratory’s model checker. To produce accurate results effi- Time protocol; ciently, our formalism included an abstraction of the pro- • tocol’s data structures that captured just those character- produce the suspected replay attack, thus verifying its istics that we believed made the protocol vulnerable. Ulti- existence; and mately, the model checker’s analysis confirmed our suspi- • prove that a suggested fix will prevent this or similar cions about the protocol’s weakness. -
Key Replay Attack on Improved Bluetooth Encryption
Key Replay Attack on Improved Bluetooth Encryption Kaarle Ritvanen and Kaisa Nyberg Nokia Research Center Helsinki, Finland fkaarle.ritvanen,[email protected] Abstract— The Bluetooth encryption algorithm E0 is consid- against the EAP-AKA protocol [4] when a Bluetooth link is ered weak, and there are plans to extend the specification so used between the victim devices [5]. that it would support several algorithms. However, this does not Before presenting the details of our attack, some background improve the overall security because an active attacker can set up a previously used encryption key by a replay attack. In this information is covered. Section II reviews the state-of-the-art paper, we show how this vulnerability can be exploited to thwart attacks on E0. The Bluetooth encryption key exchange and any improvement in the encryption method. We also investigate authentication procedures are described in Section III. alternative modifications to the Bluetooth security architecture to overcome this problem. II. ATTACKS ON ENCRYPTION ALGORITHM E0 Index Terms— ACO, Barkan–Biham–Keller attack, Bluetooth, E0, key replay In 1999, Hermelin and Nyberg showed how it is possible to recover the initial state of the LFSRs from 264 consecutive 264 I. INTRODUCTION keystream bits doing a work of [6]. The amount of work has later been reduced to 261 and the required knowledge of Bluetooth is a wireless communications standard intended keystream bits to 250 [7]. These attacks exploit linear correla- to be used in personal area networks. Many handheld devices, tions in the summation combiner. Nevertheless, these attacks such as mobile phones, personal digital assistants and laptop are of theoretical nature since the LFSRs are reinitialized after computers incorporate a Bluetooth radio to enable low-cost each packet and the length of the keystream never exceeds wireless data transmission. -
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier David Wagner Counterpane Systems U.C. Berkeley kelsey,schneier @counterpane.com [email protected] f g Abstract. We present new related-key attacks on the block ciphers 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differen- tial related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks. 1 Introduction Related-key cryptanalysis assumes that the attacker learns the encryption of certain plaintexts not only under the original (unknown) key K, but also under some derived keys K0 = f(K). In a chosen-related-key attack, the attacker specifies how the key is to be changed; known-related-key attacks are those where the key difference is known, but cannot be chosen by the attacker. We emphasize that the attacker knows or chooses the relationship between keys, not the actual key values. These techniques have been developed in [Knu93b, Bih94, KSW96]. Related-key cryptanalysis is a practical attack on key-exchange protocols that do not guarantee key-integrity|an attacker may be able to flip bits in the key without knowing the key|and key-update protocols that update keys using a known function: e.g., K, K + 1, K + 2, etc. Related-key attacks were also used against rotor machines: operators sometimes set rotors incorrectly. -
Attacking NTP's Authenticated Broadcast Mode
Attacking NTP’s Authenticated Broadcast Mode Aanchal Malhotra Sharon Goldberg Boston University Boston University [email protected] [email protected] ABSTRACT We present an on-path replay attack on authenticated We identify two attacks on the Network Time Protocol (NTP)'s broadcast mode (CVE-2015-7973) that causes the NTP client cryptographically-authenticated broadcast mode. First, we to get stuck at a particular time (Section 3), and an off-path present a replay attack that allows an on-path attacker to denial-of-service attack on authenticated broadcast mode indefinitely stick a broadcast client to a specific time. Sec- (CVE-2015-7979) that also applies to all of NTP's \preempt- ond, we present a denial-of-service (DoS) attack that al- able" and \ephemeral" modes of operation (Section 4). Both lows an off-path attacker to prevent a broadcast client from of these attacks exploit issues in the NTP protocol specifica- ever updating its system clock; to do this, the attacker tion in RFC5905 [11], and have been experimentally verified sends the client a single malformed broadcast packet per on ntpd v4.2.8p3. We conclude by discussing the inherent query interval. Our DoS attack also applies to all other challenges of cryptographically authenticating NTP's broad- NTP modes that are `ephemeral' or `preemptable' (includ- cast mode, and provide several recommendations for the way ing manycast, pool, etc). We then use network measure- forward (Section 6). ments to give evidence that NTP's broadcast and other Disclosure. These results were disclosed on October 7, ephemeral/preemptable modes are being used in the wild. -
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Symmetric Cryptography Topics 1. Modular Arithmetic 2. What is Cryptography? 3. Transposition Ciphers 4. Substitution Ciphers 1. Cæsar cipher 2. Vigènere cipher 5. Cryptanalysis: frequency analysis 6. Block Ciphers 7. AES and DES 8. Stream Ciphers Modular Arithmetic Congruence – a = b (mod N) iff a = b + kN – ex: 37=27 mod 10 b is the residue of a, modulo N – Integers 0..N-1 are the set of residues mod N Modulo 12 number system What is Cryptography? Cryptography: The art and science of keeping messages secure. Cryptanalysis: the art and science of decrypting messages. Cryptology: cryptography + cryptanalysis Terminology Plaintext: message P to be encrypted. Also called Plaintext cleartext. Encryption: altering a Encryption message to keep its Procedure contents secret. Ciphertext: encrypted message C. Ciphertext Cæsar cipher Plaintext is HELLO WORLD Change each letter to the third letter following it (X goes to A, Y to B, Z to C) – Key is 3, usually written as letter ‘D’ Ciphertext is KHOOR ZRUOG ROT 13 Cæsar cipher with key of 13 13 chosen since encryption and decryption are same operation Used to hide spoilers, punchlines, and offensive material online. Kerckhoff’s Principle Security of cryptosystem should only depend on 1. Quality of shared encryption algorithm E 2. Secrecy of key K Security through obscurity tends to fail ex: DVD Content Scrambling System Cryptanalysis Goals 1. Decrypt a given message. 2. Recover encryption key. Threat models vary based on 1. Type of information available to adversary 2. Interaction with cryptosystem. Cryptanalysis Threat Models ciphertext only: adversary has only ciphertext; goal is to find plaintext, possibly key. -
Upgrade of Bluetooth Encryption and Key Replay Attack
Upgrade of Bluetooth Encryption and Key Replay Attack Kaarle Ritvanen and Kaisa Nyberg Nokia Research Center Helsinki, Finland fkaarle.ritvanen,[email protected] Abstract— After adoption of the Advanced Encryption Stan- attack is carried out in the Bluetooth system. The fundamental dard (AES), security systems of many information and com- cause of the problem is that it is possible to replay encryption munication systems are being upgraded to support AES based keys. In Section IV-D, we present our recommendations for the encryption mechanisms. Also within Bluetooth SIG, discussions about replacing the proprietary Bluetooth encryption algorithm counter-measures that would be sufficient to allow a second E0 with a new, possibly AES based algorithm have been initiated. encryption algorithm to be securely taken into use in Bluetooth The purpose of this paper is to show that this action alone does system. not improve the overall security because in the Bluetooth system, It should be noted that recovering encryption keys is not an active attacker can set up a previously used encryption key the only exploit of the possibility for encryption key replay. by a replay attack. We analyze the problem and show that it is possible to overcome it. Finally, we present alternative modifi- For instance, Gauthier presented a key replay attack applicable cations to the Bluetooth Baseband and Profiles specifications to against the EAP-AKA protocol [5] when a Bluetooth link is support secure use of two different encryption algorithms. used between the victim devices [6]. Index Terms— AES, Bluetooth, E0, encryption, key replay Before presenting the details of our attack, some background attack information is covered. -
Understanding Wireless Security on Your Spectralink 84-Series
Best Practices Understanding Wireless Security on Your Spectralink Spectralink 84-Series Wireless Phones Spectralink’s 84-Series wireless phones meet the highest security requirements. By the time you deploy your 84-Series wireless phones, most of your basic security issues have already been ironed out by AP vendors and security servers to conform to federal regulations in place to protect personal privacy. Medical information, for example, is protected by HIPPA (Health Insurance Portability and Accountability Act) or PCI (Payment Card Industry). If you have general security questions after the deployment of your 84-Series phone, this best practices document should have the answers, or at least point you in the right direction. System Affected 84-Series Handsets Some Basics About Encryption and Authentication On Wi-Fi networks there can be a trade-off between good security and good audio. The most rigorous enterprise-level security can protect against eavesdropping and unauthorized toll calls, but it can also increase server demand, resulting in latency and audio packet loss. Implementing less robust, personal-level security measures will reduce server processing demands, ease configuration, and smooth audio flow through your network, but may not provide adequate security for many enterprise Wi-Fi networks. The good news: Proper configuration of 84-Series phones offers the best of both worlds, ensuring excellent audio in the most robust security environments. Table 1 highlights the correlation between security and audio relating to various Wi-Fi encryption and authentication techniques, with considerations for configuring the phones for the best security and audio. Number? March 2015 Best Practices Understanding Wireless Security Table 1: Enterprise Environment Security Trade-Offs Wireless Security in Audio Ease of Configuration and Other General Information Security Enterprise Method Environments WEP Poor Excellent Easy to administer, little processing overhead, adequate security for many home wi-fi networks. -
Beacon Based Authentication
University of Wollongong Research Online Faculty of Engineering and Information Faculty of Informatics - Papers (Archive) Sciences 1994 Beacon based authentication Azad Jiwa Jennifer Seberry University of Wollongong, [email protected] Yuliang Zheng University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/infopapers Part of the Physical Sciences and Mathematics Commons Recommended Citation Jiwa, Azad; Seberry, Jennifer; and Zheng, Yuliang: Beacon based authentication 1994. https://ro.uow.edu.au/infopapers/1162 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Beacon based authentication Abstract Reliable authentication of communicating entities is essential for achieving security in a distributed computing environment. The design of such systems as Kerberos, SPX and more recently KryptoKnight and Kuperee, have largely been successful in addressing the problem. The common element with these implementations is the need for a trusted thirdparty authentication service. This essentially requires a great deal of trust to be invested in the authentication server which adds a level of complexity and reduces system flexibility. The use of a Beacon to promote trust between communicating parties was first suggested by M. Rabin in "Transactions protected by beacons," Journal of Computer and System Sciences, Vol 27, pp 256-267, 1983. In this paper we revive Rabin's ideas which have been largely overlooked in the past decade. In particular we present a novel approach to the authentication problem based on a service called Beacon which continuously broadcasts certified nonces. eW argue that this approach considerably simplifies the solution ot the authentication problem and we illustrate the impact of such a service by "Beaconizing" the well know Needham and Schroeder protocol. -
Implementation of Symmetric Encryption Algorithms
Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.8, No.4, 2017 Implementation of Symmetric Encryption Algorithms Haider Noori Hussain *1 Waleed Noori Hussein *2 1.Department of Computer science , College of Education for Pure Science, University of Basra, Iraq 2.Department of Mathematics , College of Education for Pure Science, University of Basra, Iraq Abstract Cryptography considered being the most vital component in information security because it is responsible for securing all information passed through networked computers. The discussions in this paper include an overview of cryptography and symmetric encryption. This paper also discusses some of the algorithms used in our research. This paper aims to design an application that consist of some symmetric encryption algorithms which allow users to encrypt and decrypt different size of files, also the application can be used as a test field to compare between different symmetric algorithms. Keywords: Cryptography, symmetric, encryption 1. Introduction In today's technology, every second data are generated on the internet due to the online transaction. Cryptography is a necessary part of network security which allows the virtual world to be more secure. In many applications of our daily life information security plays a key role (Kumar and Munjal 2011). This applies even stronger for ubiquitous computing applications where a multitude of sensors and actuators observe and control our physical environment (Kumar and Munjal 2011). When developing such applications a software engineer usually relies on well-known cryptographic mechanisms like encryption or hashing. However, due to the multitude of existing cryptographic algorithms, it can be challenging to select an adequate and secure one (Masram, Shahare et al. -
Design and Implementation of IEEE 802.11I in Wire1x
Design and Implementation of IEEE 802.11i in WIRE1x Yuan-Yao Shih, Ming-Hung Yang, Shih-Chieh Liao, Chien-Chia Chen, Jui-Yi Chen, Yi-Ken Ho, and Jyh-Cheng Chen Wireless Internet Research and Engineering Laboratory National Tsing Hua University Hsinchu, Taiwan November 15, 2007 Abstract This document presents the design and implementation of IEEE 802.11i in WIRE1x. The implementation is integrated into WIRE1x version 2.2, and later versions. WIRE1x is an open- source implementation of IEEE 802.1x client (supplicant) developed by the Wireless Internet Research & Engineering (WIRE) Laboratory, National Tsing Hua University. IEEE 802.11i spe- cifies security mechanisms for wireless LANs. The 802.11i uses 802.1X for authentication and Robust Security Network (RSN) for keeping track of associations. It also includes two algo- rithms, Temporal Key Integrity Protocol (TKIP) and Counter mode with CBC-MAC Protocol (CCMP), to enhance the encryption. 1. Introduction The Wireless Local Area Network (WLAN) has become more popular and commonly used in recent years. The traditional wired network that uses physical lines provides poor mobility. In addition, the WLAN provides great mobility, which is the best advantage. The transmission medium of the WLAN is the air. Data are transmitted through radio, which means everyone who is within the range of the radio can intercept the data that only you should receive. In order to secure the WLAN data transmission, IEEE 802.11 standards define Wired Equivalent Privacy (WEP), which intends to provide the confidentiality as the wired network does. Unfortunately, WEP connection can be cracked with software within minutes because of several serious weaknesses. -
Weak Keys for AEZ, and the External Key Padding Attack
Weak Keys for AEZ, and the External Key Padding Attack Bart Mennink1;2 1 Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium [email protected] 2 Digital Security Group, Radboud University, Nijmegen, The Netherlands [email protected] Abstract. AEZ is one of the third round candidates in the CAESAR competition. We observe that the tweakable blockcipher used in AEZ suffers from structural design issues in case one of the three 128-bit sub- keys is zero. Calling these keys \weak," we show that a distinguishing attack on AEZ with weak key can be performed in at most five queries. Although the fraction of weak keys, around 3 out of every 2128, seems to be too small to violate the security claims of AEZ in general, they do reveal unexpected behavior of the scheme in certain use cases. We derive a potential scenario, the \external key padding," where a user of the authenticated encryption scheme pads the key externally before it is fed to the scheme. While for most authenticated encryption schemes this would affect the security only marginally, AEZ turns out to be com- pletely insecure in this scenario due to its weak keys. These observations open a discussion on the significance of the \robustness" stamp, and on what it encompasses. Keywords. AEZ, tweakable blockcipher, weak keys, attack, external key padding, robustness. 1 Introduction Authenticated encryption aims to offer both privacy and authenticity of data. The ongoing CAESAR competition [8] targets the development of a portfolio of new, solid, authenticated encryption schemes. It received 57 submissions, 30 candidates advanced to the second round, and recently, 16 of those advanced to the third round.