Iuwne10 S04 L05

1,017 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,017
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
79
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Iuwne10 S04 L05

  1. 1. WLAN Security Managing Authentication and Encryption with WPA and WPA2
  2. 2. Wi-Fi Protected Access (WPA) <ul><ul><li>WPA introduced in late 2003 </li></ul></ul><ul><ul><li>Pre-standard implementation of IEEE 802.11i WLAN security </li></ul></ul><ul><ul><li>Addresses currently known security problems with WEP </li></ul></ul><ul><ul><li>Allows software upgrade on already deployed 802.11 equipment to improve security </li></ul></ul><ul><ul><li>Components of WPA </li></ul></ul><ul><ul><ul><li>Authenticated key management using 802.1X: EAP authentication, and PSK authentication </li></ul></ul></ul><ul><ul><ul><li>Unicast and broadcast key management </li></ul></ul></ul><ul><ul><ul><li>Standardized TKIP per-packet keying and MIC protocol </li></ul></ul></ul><ul><ul><ul><li>Initialization vector space expansion: 48-bit initialization vectors </li></ul></ul></ul><ul><ul><ul><li>Migration mode—coexistence of WPA and non-WPA devices (optional implementation that is not required for WPA certification) </li></ul></ul></ul>
  3. 3. WPA Authentication Modes Encryption uses TKIP, AES optional Encryption uses TKIP, AES optional Local access control Centralized access control Shared secret used for authentication RADIUS used for authentication and key distribution Authentication server not required Authentication server required Personal (PSK Authentication) Enterprise (802.1X Authentication)
  4. 4. WPA Authentication Process
  5. 5. Purpose of Each WPA Phase <ul><ul><li>RADIUS-based key distribution </li></ul></ul><ul><ul><ul><li>Server moves (not copies) Pairwise Master Key (PMK) to access point </li></ul></ul></ul><ul><ul><li>802.1X key management </li></ul></ul><ul><ul><ul><li>Bind PMK to client and AP </li></ul></ul></ul><ul><ul><ul><li>Confirm both client and access point possess PMK </li></ul></ul></ul><ul><ul><ul><li>Generate fresh Pairwise Transient Key (PTK) </li></ul></ul></ul><ul><ul><ul><li>Prove each peer is live </li></ul></ul></ul><ul><ul><ul><li>Synchronize PTK use </li></ul></ul></ul><ul><ul><ul><li>Distribute Group Transient Key (GTK) </li></ul></ul></ul>
  6. 6. Unicast Keys: Four-Way Handshake
  7. 7. Group Key Handshake
  8. 8. WPA: Longer Key, Longer Initialization Vector IV = initialization vector
  9. 9. WPA: Per-Packet Key Mixing IV = initialization vector
  10. 10. Message Integrity Check <ul><ul><li>MIC is calculated from: </li></ul></ul><ul><ul><ul><li>MIC key </li></ul></ul></ul><ul><ul><ul><li>Destination MAC address </li></ul></ul></ul><ul><ul><ul><li>Source MAC address </li></ul></ul></ul><ul><ul><ul><li>Data payload </li></ul></ul></ul><ul><ul><li>Uses Michael Algorithm </li></ul></ul><ul><ul><ul><li>Has its own key </li></ul></ul></ul><ul><ul><li>Algorithm is relatively lightweight </li></ul></ul><ul><ul><ul><li>Computationally inexpensive </li></ul></ul></ul><ul><ul><ul><li>Can be implemented in firmware on NIC cards </li></ul></ul></ul>
  11. 11. WPA Pre-Shared Key (PSK) Authentication: Offline Dictionary Attack
  12. 12. WPA2 and IEEE 802.11i <ul><ul><li>802.11i </li></ul></ul><ul><ul><ul><li>Ratified in June 2004 </li></ul></ul></ul><ul><ul><ul><li>Standardizes </li></ul></ul></ul><ul><ul><ul><ul><li>802.1X for authentication </li></ul></ul></ul></ul><ul><ul><ul><ul><li>AES to be used for encryption </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key management </li></ul></ul></ul></ul><ul><ul><li>WPA2 </li></ul></ul><ul><ul><ul><li>Supplement to WPA ”version 1”, which uses TKIP encryption </li></ul></ul></ul><ul><ul><ul><li>Provides for AES encryption to be used </li></ul></ul></ul><ul><ul><ul><li>Third-party testing and certification for WLAN device compatibility </li></ul></ul></ul>
  13. 13. IEEE 802.11i and AES Encryption <ul><li>Uses AES encryption in lieu of RC4 encryption </li></ul><ul><ul><li>Specific AES implementation used in 802.11i is called </li></ul></ul><ul><ul><li>“AES Counter Mode with CBC-MAC authentication” (a.k.a. AES-CCMP) </li></ul></ul><ul><ul><li>128-bit, symmetric block cipher (versus RC4 stream cipher) </li></ul></ul><ul><ul><li>AES cryptographically more robust than RC4 (and requires more computational power) </li></ul></ul><ul><ul><li>AES is implemented in hardware </li></ul></ul>
  14. 14. WPA/WPA2/802.11i Comparison Enterprise Enterprise SOHO No test, specification Test devices for compliance Test devices for compliance Allows ad hoc Ad hoc not supported Ad hoc not supported 128-bit AES encryption cipher 128-bit AES encryption cipher 128-bit RC4 w/ TKIP encryption cipher 802.1X authentication 802.1X authentication/PSK 802.1X authentication/PSK 802.11i WPA2 WPA
  15. 15. 802.11i Key Caching and Preauthentication <ul><li>802.11i allows credentials to be cached on an AP, and a client to preauthenticate on several APs </li></ul>
  16. 16. Cisco Centralized Key Management
  17. 17. Summary <ul><ul><li>WPA creates a new framework for authentication and encryption. </li></ul></ul><ul><ul><li>With WPA, authentication can still be PSK-based, like WEP, but can also be 802.1X-based. </li></ul></ul><ul><ul><li>WPA encryption is still RC4, but enhanced to make it harder to crack. </li></ul></ul><ul><ul><li>WPA2 uses AES-CCMP for encryption, known to be unbreakable. </li></ul></ul><ul><ul><li>802.11i is a protocol, and WPA2 certifies its implementation. </li></ul></ul><ul><ul><li>Cisco Centralized Key Management is a Cisco feature allowing caching of credentials to improve roaming efficiency. </li></ul></ul>

×