Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,077
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
73
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Wired Equivalent Privacy - WEP -
  • 2. Wired Equivalent Privacy (WEP) ‏
    • Introduction
    • Overview
    • Authentication
    • Encryption
    • Decryption
    • Recommends
    • Q&A
  • 3. Introduction
    • A wired LAN : physical security
    • A wireless LAN : radio waves environments
  • 4. Introduction (Cont) ‏
    • Introduced in1997
    • Bring the security of wired to wireless network
    • The first and most used-widely algorithm for wireless network
  • 5. Ways to Attack
    • Passive Attacks (Sniffer)
      • Hack WEP
      • Hack WPA, WPA2
      • Sniffer Packets
  • 6. Ways to Attack (Cont)
    • Active Attacks
  • 7. Ways to Attack (Cont)
    • Jamming Attacks
  • 8. Ways to Attack (Cont)
    • Man In Middle Attacks
  • 9. Overview
    • Protect data privacy
      • WEP (Wired Equivalent Privacy) ‏
    • Protect data integrity
      • CRC (Cyclic Redundancy Check) ‏
  • 10. Overview (Cont) ‏
    • Provide authentication and encryption
    • All rely on share key
    • Uses RC4 for encryption
  • 11. Overview (Cont) ‏
    • Discard wrong frames
    • Uses ICV (Integrity Check Value) ‏
  • 12. Authentication
    • Open System Authentication
    • Shared Key Authentication
  • 13. Shared Key Authentication
  • 14. Encryption
  • 15. Transmission Data
  • 16. Decryption
  • 17. XOR A B A XOR B 1 1 0 1 0 1 0 1 1 0 0 0
  • 18. What’s Problem ???
    • IV : 24 bit, small, plain text, static
    • IV : a part of the RC4 encryption key
    • ICV : not encrypted
      • Data integrity : not safe
  • 19. Breaking the Authentication
    • Collecting :
          • Clear-text challenge
          • Encrypted text
    • Compute the RC4 key
  • 20. Recommends
    • Avoid WEP, use WPA or WPA2
    • Don’t use a weak key
    • Change key periodically
    • Uses tools
  • 21. Q&A