A History of WEP
Download
Report
Transcript A History of WEP
A History of
WEP
The Ups and Downs of
Wireless Security
Wireless Communication
Beginnings
Early
Cordless Phones and Cell Phones
Used same idea as Walkie-Talkies
Anyone with a “Scanner” could easily
eavesdrop on calls
Used a Spread-Spectrum algorithm to
defeat the traditional “Scanner”
The 802.11 Standard
Defines
wireless communications
protocols
802.11b, 802.11g, 802.11n common wireless
network protocols
Similar to early Cell Phones and Cordless
Phones at the start – no real protection
Can easily find out network names and
connect to them
Invent of War Driving!
Early Security Attempts
Open
Access to Networks – Solution?
Filter the “unique” MAC address of the
wireless cards
Problem?
Keep a large list of EVERY network card that
can have access
No real authentication or check takes
place
MAC addresses can be “spoofed”
Introducing WEP
W.E.P.
– Wired Equivalent Privacy
Introduced in September of 1999
First real attempt at securing open wireless
networks
Attempted to make the network as
confidential as a traditional wired network
Originally
used a 40-bit security key, later
expanded to 104-bits, and 232-bits
A Look At WEP
IV – Initialization Vector (24-bits)
Key Selected by User
Combined to create a seed to generate the
keystream
All Secured Sir…….
RC4
is a popular cipher used in many
security applications
Problem: RC4 is a stream cipher
Keystream cannot be reused or you can
get back the message
24-bit IV has a 50% chance of repeating on
a busy network after 5000 IVs generated
Can also capture packets an replay them:
poor authentication
Demonstration Time
After WEP
WPA
created to use existing hardware
Fixes many of the downfalls of WEP
Not without its own problems
Uses a password to generate keys
Dictionary attack
TKIP Algorithm used has flaws
WPA2
developed to fix WPA
Made before WPA flaw discovered