SlideShare a Scribd company logo
1 of 17
DEIOC




Authentication in wireless networks




                       Ludo Stoetenga
                      Chris van den Berg

                     Noordelijke Hogeschool Leeuwarden
DEIOC




Introduction

 ProjectObjectives
 Choices
  –   Network type
  –   Standards
 Types of Connections
 Encryption methods
 Conclusion
DEIOC




Project Objectives

 Investigate through documents and lecture
  studies about the subject and write a
  theoretical description about this.
 Implement one of the encryption methods in
  a Java based environment.
 Write a document how we implemented the
  authentications in Java.
DEIOC




Choices

 Network    types
  –   TTP (Trusted Third Party)
  –   Location Limited
  –   Chain of Thrust
 Standards
  –   802.11b (Wi-Fi)
  –   802.16 (Broadband Wireless Metropolitan Area
      Networks)
DEIOC




TTP (Trusted Third Party)

A  server that is trusted by the clients
 The server defines the protocol for secure
  connections.


                       TTP




     Client A                          Client B
DEIOC




Wireless

               There are two standards
          802.11                    802.16
   Wi-Fi                    MAN
   Authentication           Authentication
     – Open Key                – Open Key
     – Shared Key              – Shared Key
   Encryption               Encryption
     – RC4                     – RSA
                               – TripleDES
DEIOC




Connections

   Client connect with the TTP for the first time
   Client connect with a different Client
DEIOC




Client connect with the TTP


        Client                                                         TTP
                          Given a password (on a paper)




                 Agree on secret key by Diffie-Hellman key agreement



                   Send given password (encrypted with secret key)



                  Send new password (encrypted with secret key)
DEIOC




Client connect with a different Client

        Client A        Agree on Connection               Client B




                                  TTP

                   Get keys from the TTP encrypted with
                             Shared Secret key




                     Send data encrypted with the keys
                           provided by the TTP
DEIOC




Encryption methods

 Diffie-Hellman
              key agreement
 Lamport Scheme
 RSA
 RC4
 TripleDES
DEIOC




 Diffie-Hellman key agreement


                      A                                                   B
                          A and B agree on: P (prime) and G (1 > g > p)


Gen X (0 > x > p-1)                            Gx

                                                                              Gen Y (0 > x > p-1)
                                               Gy




                             A and B can both Compute Gxy
                               Gxy is the Shared secret Key
DEIOC




Lamport scheme

   Shared secret key
   40-bits key



Shared Secret Key


                    One way function   New Shared Secret Key


    Key (40 bits)
DEIOC




RSA

• 2 large primes P and Q
• Compute N = P * Q and F = (P-1)(Q-1)              • N modules
• Select Random: E, 1 < E < F ( gcd(E,F)=1 )        • E Encryption exponent
• Select Unique: D, 1 < D < F ( E * D = 1 (mod F)   • D Decryption Exponent




                A                                      B
                                 Send N, E


                               C = ME mod N
                                                            M = CD mod N
DEIOC




RC4

                     A                                      B
                                Shared secret Key


Encrypt Plain Text
 with Secret Key                  Cipher Text
                                                                Decrypt Cipher text
                                                                 with Secret Key


     • RC4 uses a variable length key from 1 to 256 bytes
     • The stream cipher uses swap and modulate operations to encrypt
DEIOC




DES

              A                                              B
                              Shared secret Key


                                 Cipher Text


                                Encryption
                  L0            L1                    L16
Input                                                                        output
        IP                                                            FP
                  R0      L0 + F(R0,key1)      L15 + F(R15,key16)


 Decryption is simply the inverse of encryption, following the same steps
 as above, but reversing the order in which the subkeys are applied.
 Blocksize is 64 bits
DEIOC




TripleDES

   Triple-DES is just DES with two 48-bit key array’s
    applied in 3 rounds


                            Encryption


      Encrypt (key 1)     Decrypt (key 2)    Encrypt (key 1)



                            Decryption

      Decrypt (key 1)     Encrypt (key 2)    Decrypt (key 1)
DEIOC




Conclusion

 Encryption   methods are not secure
  –   Methods are insecure
  –   Errors by programming
 Standards
  –   RC4
  –   RSA
  –   TripleDES

More Related Content

What's hot

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryptionAlexander Decker
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
A TLS Story
A TLS StoryA TLS Story
A TLS Storyereddick
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 

What's hot (20)

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Ch9
Ch9Ch9
Ch9
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
661 665
661 665661 665
661 665
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Unit 1
Unit 1Unit 1
Unit 1
 
Kleptography
KleptographyKleptography
Kleptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 

Viewers also liked

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authenticationamanchaurasia
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksLeMeniz Infotech
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 

Viewers also liked (8)

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Network security
Network securityNetwork security
Network security
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 

Similar to Authentication in Wireless Networks

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gatakajiboutin
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gatakaDefconRussia
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingajithc0003
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 

Similar to Authentication in Wireless Networks (20)

Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gataka
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Internet security
Internet securityInternet security
Internet security
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Day-3 PowerPoint
Day-3 PowerPointDay-3 PowerPoint
Day-3 PowerPoint
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 

More from Chris van den Berg

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafChris van den Berg
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performanceChris van den Berg
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectChris van den Berg
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheChris van den Berg
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - PlatformChris van den Berg
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influenceChris van den Berg
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsChris van den Berg
 

More from Chris van den Berg (10)

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - Telegraaf
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performance
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana Connect
 
Gamify a contact center
Gamify a contact centerGamify a contact center
Gamify a contact center
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ Coniche
 
Result of the pilot by CAIWAY
Result of the pilot by CAIWAYResult of the pilot by CAIWAY
Result of the pilot by CAIWAY
 
Gamify a callcenter?
Gamify a callcenter?Gamify a callcenter?
Gamify a callcenter?
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - Platform
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influence
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijs
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Authentication in Wireless Networks

  • 1. DEIOC Authentication in wireless networks Ludo Stoetenga Chris van den Berg Noordelijke Hogeschool Leeuwarden
  • 2. DEIOC Introduction  ProjectObjectives  Choices – Network type – Standards  Types of Connections  Encryption methods  Conclusion
  • 3. DEIOC Project Objectives  Investigate through documents and lecture studies about the subject and write a theoretical description about this.  Implement one of the encryption methods in a Java based environment.  Write a document how we implemented the authentications in Java.
  • 4. DEIOC Choices  Network types – TTP (Trusted Third Party) – Location Limited – Chain of Thrust  Standards – 802.11b (Wi-Fi) – 802.16 (Broadband Wireless Metropolitan Area Networks)
  • 5. DEIOC TTP (Trusted Third Party) A server that is trusted by the clients  The server defines the protocol for secure connections. TTP Client A Client B
  • 6. DEIOC Wireless There are two standards 802.11 802.16  Wi-Fi  MAN  Authentication  Authentication – Open Key – Open Key – Shared Key – Shared Key  Encryption  Encryption – RC4 – RSA – TripleDES
  • 7. DEIOC Connections  Client connect with the TTP for the first time  Client connect with a different Client
  • 8. DEIOC Client connect with the TTP Client TTP Given a password (on a paper) Agree on secret key by Diffie-Hellman key agreement Send given password (encrypted with secret key) Send new password (encrypted with secret key)
  • 9. DEIOC Client connect with a different Client Client A Agree on Connection Client B TTP Get keys from the TTP encrypted with Shared Secret key Send data encrypted with the keys provided by the TTP
  • 10. DEIOC Encryption methods  Diffie-Hellman key agreement  Lamport Scheme  RSA  RC4  TripleDES
  • 11. DEIOC Diffie-Hellman key agreement A B A and B agree on: P (prime) and G (1 > g > p) Gen X (0 > x > p-1) Gx Gen Y (0 > x > p-1) Gy A and B can both Compute Gxy Gxy is the Shared secret Key
  • 12. DEIOC Lamport scheme  Shared secret key  40-bits key Shared Secret Key One way function New Shared Secret Key Key (40 bits)
  • 13. DEIOC RSA • 2 large primes P and Q • Compute N = P * Q and F = (P-1)(Q-1) • N modules • Select Random: E, 1 < E < F ( gcd(E,F)=1 ) • E Encryption exponent • Select Unique: D, 1 < D < F ( E * D = 1 (mod F) • D Decryption Exponent A B Send N, E C = ME mod N M = CD mod N
  • 14. DEIOC RC4 A B Shared secret Key Encrypt Plain Text with Secret Key Cipher Text Decrypt Cipher text with Secret Key • RC4 uses a variable length key from 1 to 256 bytes • The stream cipher uses swap and modulate operations to encrypt
  • 15. DEIOC DES A B Shared secret Key Cipher Text Encryption L0 L1 L16 Input output IP FP R0 L0 + F(R0,key1) L15 + F(R15,key16)  Decryption is simply the inverse of encryption, following the same steps as above, but reversing the order in which the subkeys are applied.  Blocksize is 64 bits
  • 16. DEIOC TripleDES  Triple-DES is just DES with two 48-bit key array’s applied in 3 rounds Encryption Encrypt (key 1) Decrypt (key 2) Encrypt (key 1) Decryption Decrypt (key 1) Encrypt (key 2) Decrypt (key 1)
  • 17. DEIOC Conclusion  Encryption methods are not secure – Methods are insecure – Errors by programming  Standards – RC4 – RSA – TripleDES