Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IEEE 802.11 Wireless Security Standards

No description
by

Joseph Jo

on 30 July 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IEEE 802.11 Wireless Security Standards

How WEP works?
Security standards
for IEEE 802.11 Wireless
Presentation

Types of IEEE 802.11
Encryption Algorithm
Key Hierarchies
WPA
Cracking WEP
Tools required:
Probe Process
Example
Encryption
Team Member:
Joseph Lim
Guo Shimin
Ji Ting Ting

EG3766 - Mobile Communication
Network

WEP
WPA
WPA 2
What is WEP, WPA & WPA2?
What does they do?
A security algorithm for IEEE 802.11 wireless network
Provide data privacy
Provide data integrity
CRC - 32
Initialization
Vector (IV)
WEP Key
Seed
Plain Text
X-OR
Keystream
IV + WEP Key
Ciphertext
Overview
Blur
CRC - 32
Initialization
Vector (IV)
WEP Key
Seed
Plain Text
X-OR
Keystream
IV + WEP Key
Ciphertext
Plain text
ICV
Cain & Abel
Airpcap Adapter
Outcome?
WEP Vulnerabilities
IV too small and in clear text
Only encrypts data frame
Key management issue
Serves as an transition to WPA2
3 main components of WPA
Encryption
Access Control
Integrity Check
2 Flavours:
Personal mode
Enterprise mode
(Wifi-Protected Access)
. TKIP
Per-Packet key mixing function
IV
Secret Key
A B C
1 2 3 4
IV
Secret Key
1 A 2
B 3 C 4
Targeted mainly for legacy equipment
. CCMP
Confidentiality
Authentication
Access Control
Access Control
. IEEE 802.1X
. EAP
. RADIUS
Integrity Check
Pairwise Master Key - PMK
Pairwise Transient Key - PTK
Group Transient Key - GTK
4 Way Handshake
Enterprise Mode
Personal Mode
PTK Generation
Process
How WPA can be cracked?
How is WPA secured?
MIC is 64 bit long, encrypt both header and payload
PMK is never actually transmitted through air
Client cannot decrypt another client's traffic using its own PTK
But is it really secured ???
Example
Capturing 4 way hand shake
Brute force in !
Seed
Keystream
IV + WEP Key
Ciphertext
Integrity
Check
Value
Comparison
Conclusion
THE END
FUN FACTS
AND
NOR
OR
XOR
CipherText = Keystream XOR Plaintext
Plaintext = Keystream XOR CipherText
Full transcript