SlideShare a Scribd company logo
1 of 30
Wireless
          LAN
        Security
Ajay K Mathias   M120445CS
Govind M         M120432CS
Johnes Jose      M120088CS
Introduction


      WEP



        EAP              Overview

     Authenticated KEP

Conclusion
Wireless Networks
 Extension   of Wired networks, without using
  wires.
 IEEE 802.11 (1997)
     802.11b (1999), 802.11g (2003), 802.11n (2009)
     802.11i (2004)
2    Types : Adhoc & Infrastructural WLAN
Ad Hoc WLAN




• Connect with whichever station
• Hop Hop.. Hop Hop..
• No device in the middle.
Infrastructure WLAN
 Parties   Involved
     Wireless
             Station
     Access Point (AP)
     Ground Station



 Terms
     BSS / ESS
     SSID
     Beacon
     Probe Request, Response
     Associate Frame
      Request, Response
Security in WLAN
 Main  Point of Concern
 Multiple Options exists in Wired Networks.
 SSID / MAC based Authentication was
  used, both of which were spoof-able.
 Common Attacks Possible
     Masquerading
     Man in the middle
     Dictionary Attacks
 Requirement : Privacy Equivalent to that
 in Wired Networks
Wired Equivalent Privacy (WEP)

  Challenge     Response Protocol

                      Random Nonce, C


       Station                                  Access
                                                 Point
                    Response, R
                    Initialization Vector, IV




            R = C O KEYSTREAM(S, IV)
                  +
But…..!
 WEP   had the following security Issues
    Monitor Challenge Response to compute
     Keystream.
    Obtain S, using Dictionary Attack
    One side Authentication




Thus…..
 A better protocol was required
  WPA
Post WEP security
 WPA  (TKIP) – Temporal Key Integrity
  Protocol
 WPA 2 (CCMP) – Counter mode CBC
  MAC Protocol
    The authentication in both schemes same
    Authentication same as in 802.11i
    Former uses RC4 key-stream encryption
    Latter uses AES with cipher block chaining
AUTHENTICATION IN WPA
3    entities
     Supplication (Station)
     Authenticator (AP – Access Point)
     Authentication Server (AS)
 EAP (Extensible Authentication Protocol)
 Authentication, Authorization &
  Accounting
802.11i Protocol

                                               Authentication
Supplicant                   Authenticator         Server

              802.11
              Association

                 EAP/802.1X/RADIUS
                 Authentication
                                             MSK

              4-Way
              Handshake

             Group Key
             Handshake

             Data
             Communication
AUTHENTICATION METHODS
 EAP – MD5
 EAP – TLS
 EAP – TTLS
 EAP – PEAP
EAP – MD5
 Basicform
 Challenge is to send MD5 of password
 Password not known to AP, AS
 Drawbacks:
     Replay attack possible with MD5(password)
     AP is not verified to the supplicant
EAP-TLS
 Uses  SSL/TLS
 All Entities have Certificates & Pvt. keys
 Drawbacks:
     Infeasible for all stations to have certificates
     PKI required to communicate
EAP-TTLS
 Requires AP to have certificates
 AP can be verified by AS, supplicants
 Forms a secure tunnel through which
  password can be sent

EAP-PEAP
 Similar
        to EAP-TTLS
 Forms a secure tunnel
 Authentication of station to AS
  independent
KEY AGREEMENT
 Two   types of keys:
    TK (Temporal Key) [128]
    GTK (Group Transient Key) [128]
 PMK  can be replaced by PSK (Pre Shared
  Key) [256], but not secure
 TK and other keys are derived from PMK
  (Pairwise Master Key) [256] by 4-way
  handshake protocol
KEY HIERARCHY

                MSK [256] : AS & Station
                PMK [256] : AP (derived
                from MSK)
                PTK = f(PMK) [512]
                PTK -> TK [128]
                PTK -> KCK [128]
                PTK -> KEK [128]
FOUR WAY HANDSHAKE


Calculate PTK



                                          Calculate PTK




       PTK = prf (PMK,NA,NB,MACA,MACS)
       PTK = (TK, KCK, KEK)
EAP-SPEKE

 Simple  Password-Authenticated
  Exponential Key Exchange
 Diffie-Hellman based
 Authentication with session key
  negotiation
 Mutual Authentication
 Withstands Man in the middle attack
 Withstands Replay attack
Supplicant              Authenticator


A = gXa mod p     A
g = f(pd)                 B = gXb mod p
Xa = secret key           Xb = secret key




                  S(n1)
S= H(BXamod p)            S = H(AXb mod p)
n1 = nonce                n2 = nonce




                  S(n2)
    Verify n1                 Verify n2
EAP - SRP
 EAP-Secure  Remote Password
 Borrows elements from other key
  exchange protocol
 User ID and password-based
  authentication
Supplicant                    Authenticator

                                B = (V+gXb) mod p
A = gXa mod p           A, ID   Xb = secret key
g = f(pd)                       V = gx mod p
Xa = secret key
                                x = H(Salt, pd)
ID = identifier



x = H(Salt, pd)
u = H(A, B)
S = (B-gx)Xa+ux mod p
K = H(S)
                                u = H(A, B)
                                S = (AVu) Xbmod p
                                K = H(S)
     Verify n1
Improved EAP-SRP




A = gXa mod p

Ma = H(H(Pd) Xor H(g), H(ID), A)   A,ID,Ma
                                                B = (v + gXb) mod p
                                                U = H(A, B)
                                                S = (A.Vu)Xb mod p
                                                K = H(s)
                                                Mb = H(A, B, Ma, k)
                              Salt, Mb, B
 U = H(A,B)
 S = (B-gx)(Xa+Ux) mod p
 K = H(S)
 Mc = H(B, Mb, K)
                              Mc
                                                 Session Key
                                             Mutual Authentication
• Mutual Authentication             • Computationally
Pros




                                    Cons
       • No Cleartext Password               Intensive
         Exchange                            (Comparitively)
       • Works against                     • Narrow domain of
         Dictionary                          choosing primes.
         Attacks, Password
         Sniffing and Network               (eg. Reqd : Prime p,q
         Traffic Analysis Attacks           such that p = 2q+1)
       • Easier to setup, than
         Dig Cert based
         Authentication.
References
1.   An Efficient Password Authenticated Key Exchange Protocol for
     WLAN and WIMAX, AK Rai, V Kumar, S Mishra, ICWETT
     2011

2.   Extensible authentication
     protocol, Adoba, B., Blunk, L., Vollbrecht, J., Carlson
     , J. & Levkowetz, E., RFC 3748 2004

3.   The SRP Authentication and Key Exchange System, T. Wu, RFC
     2945 2000

4.   Cryptography and Network Security, Bernard
     Menesez, Cengage Solutions
Thank You…!

More Related Content

What's hot

Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsmvde3000
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSASam Bowne
 
The Cryptography has YOU
The Cryptography has YOUThe Cryptography has YOU
The Cryptography has YOUYurii Bilyk
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
Rust Intro @ Roma Rust meetup
Rust Intro @ Roma Rust meetup Rust Intro @ Roma Rust meetup
Rust Intro @ Roma Rust meetup Claudio Capobianco
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesSam Bowne
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
SSL/POODLE: History repeats itself
SSL/POODLE: History repeats itselfSSL/POODLE: History repeats itself
SSL/POODLE: History repeats itselfYurii Bilyk
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSASam Bowne
 
Implementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaImplementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaTristan Penman
 
Part 8 : TCP and Congestion control
Part 8 : TCP and Congestion controlPart 8 : TCP and Congestion control
Part 8 : TCP and Congestion controlOlivier Bonaventure
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...Tristan Penman
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
CNIT 141 9. Hard Problems
CNIT 141 9. Hard ProblemsCNIT 141 9. Hard Problems
CNIT 141 9. Hard ProblemsSam Bowne
 

What's hot (20)

Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
 
The Cryptography has YOU
The Cryptography has YOUThe Cryptography has YOU
The Cryptography has YOU
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Rust Intro @ Roma Rust meetup
Rust Intro @ Roma Rust meetup Rust Intro @ Roma Rust meetup
Rust Intro @ Roma Rust meetup
 
CNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic CurvesCNIT 141 12. Elliptic Curves
CNIT 141 12. Elliptic Curves
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
SSL/POODLE: History repeats itself
SSL/POODLE: History repeats itselfSSL/POODLE: History repeats itself
SSL/POODLE: History repeats itself
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSA
 
7 tcp-congestion
7 tcp-congestion7 tcp-congestion
7 tcp-congestion
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Implementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaImplementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and Akka
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Part 8 : TCP and Congestion control
Part 8 : TCP and Congestion controlPart 8 : TCP and Congestion control
Part 8 : TCP and Congestion control
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
 
4 transport-sharing
4 transport-sharing4 transport-sharing
4 transport-sharing
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
CNIT 141 9. Hard Problems
CNIT 141 9. Hard ProblemsCNIT 141 9. Hard Problems
CNIT 141 9. Hard Problems
 

Viewers also liked

Graph based approaches to Gene Expression Clustering
Graph based approaches to Gene Expression ClusteringGraph based approaches to Gene Expression Clustering
Graph based approaches to Gene Expression ClusteringGovind Maheswaran
 
Authentication in Wireless Networks
Authentication in Wireless NetworksAuthentication in Wireless Networks
Authentication in Wireless NetworksChris van den Berg
 
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0Cult A Way 2012 Quiz : Quarter Life Crisis 2.0
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0Govind Maheswaran
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authenticationamanchaurasia
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsGovind Maheswaran
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksLeMeniz Infotech
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 

Viewers also liked (13)

Neo4jrb
Neo4jrbNeo4jrb
Neo4jrb
 
Workshop on git
Workshop on gitWorkshop on git
Workshop on git
 
Graph based approaches to Gene Expression Clustering
Graph based approaches to Gene Expression ClusteringGraph based approaches to Gene Expression Clustering
Graph based approaches to Gene Expression Clustering
 
Authentication in Wireless Networks
Authentication in Wireless NetworksAuthentication in Wireless Networks
Authentication in Wireless Networks
 
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0Cult A Way 2012 Quiz : Quarter Life Crisis 2.0
Cult A Way 2012 Quiz : Quarter Life Crisis 2.0
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Network security
Network securityNetwork security
Network security
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 

Similar to Improved EAP-SRP in Wireless Network Authentication

Similar to Improved EAP-SRP in Wireless Network Authentication (20)

Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
015 spins
015 spins015 spins
015 spins
 
Moein
MoeinMoein
Moein
 
11 01 Tbd I Radius Security
11 01 Tbd I Radius Security11 01 Tbd I Radius Security
11 01 Tbd I Radius Security
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 
introduction to cryptography (basics of it)
introduction to cryptography (basics of it)introduction to cryptography (basics of it)
introduction to cryptography (basics of it)
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
 
Computer network (3)
Computer network (3)Computer network (3)
Computer network (3)
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
 
IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOL
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Improved EAP-SRP in Wireless Network Authentication

  • 1. Wireless LAN Security Ajay K Mathias M120445CS Govind M M120432CS Johnes Jose M120088CS
  • 2. Introduction WEP EAP Overview Authenticated KEP Conclusion
  • 3.
  • 4. Wireless Networks  Extension of Wired networks, without using wires.  IEEE 802.11 (1997)  802.11b (1999), 802.11g (2003), 802.11n (2009)  802.11i (2004) 2 Types : Adhoc & Infrastructural WLAN
  • 5. Ad Hoc WLAN • Connect with whichever station • Hop Hop.. Hop Hop.. • No device in the middle.
  • 6. Infrastructure WLAN  Parties Involved  Wireless Station  Access Point (AP)  Ground Station  Terms  BSS / ESS  SSID  Beacon  Probe Request, Response  Associate Frame Request, Response
  • 7.
  • 8. Security in WLAN  Main Point of Concern  Multiple Options exists in Wired Networks.  SSID / MAC based Authentication was used, both of which were spoof-able.  Common Attacks Possible  Masquerading  Man in the middle  Dictionary Attacks  Requirement : Privacy Equivalent to that in Wired Networks
  • 9. Wired Equivalent Privacy (WEP)  Challenge Response Protocol Random Nonce, C Station Access Point Response, R Initialization Vector, IV R = C O KEYSTREAM(S, IV) +
  • 10. But…..!  WEP had the following security Issues  Monitor Challenge Response to compute Keystream.  Obtain S, using Dictionary Attack  One side Authentication Thus….. A better protocol was required  WPA
  • 11.
  • 12. Post WEP security  WPA (TKIP) – Temporal Key Integrity Protocol  WPA 2 (CCMP) – Counter mode CBC MAC Protocol  The authentication in both schemes same  Authentication same as in 802.11i  Former uses RC4 key-stream encryption  Latter uses AES with cipher block chaining
  • 13. AUTHENTICATION IN WPA 3 entities  Supplication (Station)  Authenticator (AP – Access Point)  Authentication Server (AS)  EAP (Extensible Authentication Protocol)  Authentication, Authorization & Accounting
  • 14. 802.11i Protocol Authentication Supplicant Authenticator Server 802.11 Association EAP/802.1X/RADIUS Authentication MSK 4-Way Handshake Group Key Handshake Data Communication
  • 15. AUTHENTICATION METHODS  EAP – MD5  EAP – TLS  EAP – TTLS  EAP – PEAP
  • 16. EAP – MD5  Basicform  Challenge is to send MD5 of password  Password not known to AP, AS  Drawbacks:  Replay attack possible with MD5(password)  AP is not verified to the supplicant
  • 17. EAP-TLS  Uses SSL/TLS  All Entities have Certificates & Pvt. keys  Drawbacks:  Infeasible for all stations to have certificates  PKI required to communicate
  • 18. EAP-TTLS  Requires AP to have certificates  AP can be verified by AS, supplicants  Forms a secure tunnel through which password can be sent EAP-PEAP  Similar to EAP-TTLS  Forms a secure tunnel  Authentication of station to AS independent
  • 19. KEY AGREEMENT  Two types of keys:  TK (Temporal Key) [128]  GTK (Group Transient Key) [128]  PMK can be replaced by PSK (Pre Shared Key) [256], but not secure  TK and other keys are derived from PMK (Pairwise Master Key) [256] by 4-way handshake protocol
  • 20. KEY HIERARCHY MSK [256] : AS & Station PMK [256] : AP (derived from MSK) PTK = f(PMK) [512] PTK -> TK [128] PTK -> KCK [128] PTK -> KEK [128]
  • 21. FOUR WAY HANDSHAKE Calculate PTK Calculate PTK  PTK = prf (PMK,NA,NB,MACA,MACS)  PTK = (TK, KCK, KEK)
  • 22.
  • 23. EAP-SPEKE  Simple Password-Authenticated Exponential Key Exchange  Diffie-Hellman based  Authentication with session key negotiation  Mutual Authentication  Withstands Man in the middle attack  Withstands Replay attack
  • 24. Supplicant Authenticator A = gXa mod p A g = f(pd) B = gXb mod p Xa = secret key Xb = secret key S(n1) S= H(BXamod p) S = H(AXb mod p) n1 = nonce n2 = nonce S(n2) Verify n1 Verify n2
  • 25. EAP - SRP  EAP-Secure Remote Password  Borrows elements from other key exchange protocol  User ID and password-based authentication
  • 26. Supplicant Authenticator B = (V+gXb) mod p A = gXa mod p A, ID Xb = secret key g = f(pd) V = gx mod p Xa = secret key x = H(Salt, pd) ID = identifier x = H(Salt, pd) u = H(A, B) S = (B-gx)Xa+ux mod p K = H(S) u = H(A, B) S = (AVu) Xbmod p K = H(S) Verify n1
  • 27. Improved EAP-SRP A = gXa mod p Ma = H(H(Pd) Xor H(g), H(ID), A) A,ID,Ma B = (v + gXb) mod p U = H(A, B) S = (A.Vu)Xb mod p K = H(s) Mb = H(A, B, Ma, k) Salt, Mb, B U = H(A,B) S = (B-gx)(Xa+Ux) mod p K = H(S) Mc = H(B, Mb, K) Mc Session Key Mutual Authentication
  • 28. • Mutual Authentication • Computationally Pros Cons • No Cleartext Password Intensive Exchange (Comparitively) • Works against • Narrow domain of Dictionary choosing primes. Attacks, Password Sniffing and Network (eg. Reqd : Prime p,q Traffic Analysis Attacks such that p = 2q+1) • Easier to setup, than Dig Cert based Authentication.
  • 29. References 1. An Efficient Password Authenticated Key Exchange Protocol for WLAN and WIMAX, AK Rai, V Kumar, S Mishra, ICWETT 2011 2. Extensible authentication protocol, Adoba, B., Blunk, L., Vollbrecht, J., Carlson , J. & Levkowetz, E., RFC 3748 2004 3. The SRP Authentication and Key Exchange System, T. Wu, RFC 2945 2000 4. Cryptography and Network Security, Bernard Menesez, Cengage Solutions