SlideShare a Scribd company logo
Wired Equivalent Privacy
(WEP)
• Cryptographic Background to WEP
• WEP Cryptographic Operations
• Problems with WEP
• Dynamic WEP
Contents
• Guarding against traffic interception is the domain of
cryptographic protocols.
• two most commonly cited informal security objectives are
1. maintaining the secrecy of network data and
2. ensuring it has not been tampered with.
• Initially ,WEP was the answer for wireless security.
• WEP has many flaws, but better than nothing (very simple)
WEP
 WEP requires the use of the RC4 cipher (A stream cipher )
 A stream cipher uses a stream of bits, called the keystream.
 The keystream is then combined with the message to produce the ciphertext.
 To recover the original message, the receiver processes the ciphertext with
an identical keystream.
Cryptographic Background to WEP
Keyed stream cipher operation
Most stream ciphers operate by taking a relatively short secret key and
expanding it into a pseudorandom keystream the same length as the
message. The pseudorandom number generator (PRNG) is a set of rules
used to expand the key into a keystream.
Cryptographic Background to WEP
Cryptographic Background to WEP
Stream Cipher Security
• A totally random keystream is called a one-time pad and is the only
known encryption scheme that is mathematically proven to protect
against certain types of attacks.
• One-time pads are not commonly used ,since
• keystream must be perfectly random
• the same length as the data
• it can never be reused.
WEP Cryptographic Operations
3 major objectives of security
1. Confidentiality :
• protection against interception by unauthorized parties.
• provided by encryption
2. Integrity :
• make sure data has not been modified.
• provided by integrity check sequence
3. Authentication and authorization
• finding out who the user is . WEP uses 802.1x.
• whether the access operation is allowed
 WEP attempts to meet all these objectives
WEP Cryptographic Operations
• Confidentiality and integrity are handled simultaneously in WEP
WEP Data Processing
WEP Cryptographic Operations
WEP Data Processing
As input, WEP requires three items:
1. The payload to be protected
2. A secret key, used in frame encryption. WEP allows four keys to be
stored simultaneously.
3. An initialization vector, used along with the secret key in frame
transmission.
After processing, WEP has a single output:
 An encrypted frame, ready for transmission over an untrusted network
with enough information to enable decryption at the remote end.
WEP Cryptographic Operations
WEP key length
• The only key length present in the standard is a 64-bit WEP seed
• 40 bits are shared, IV-24 bits
• 128-bit WEP seed
• 104 bits are a kept secret
• One vendor even offers the option of using 256-bit secret keys
• WEP, however, is not a well-designed cryptographic system, and the extra
bits in the key buy you very little
WEP Cryptographic Operations
Types of WEP keys
Two types of WEP keys
• Default keys (broadcast keys)
• Key mapping keys(unicast keys )
WEP Cryptographic Operations
• Each mobile device can have its own key value for unicast
frame.
• All users share a single default key.
• The AP can operate with default keys and key mapping keys
simultaneously;
• When the AP receives a frame (or wants to send one), it looks
in the key table to see whether there is an entry
corresponding to the MAC address of the mobile. If it finds an
entry, it uses it. If not, it uses the default key instead.
Key Mapping Keys
WEP Cryptographic Operations
• WEP uses two key distribution schemes:
Static WEP.
• Administrators distribute single default key manually
• Manual Key updates .
• WEP without any key distribution mechanism is often called
manual WEP or static WEP.
• uses same key for all frames transmitted by every station
• Static WEP is supported by Many low-power devices such as
802.11 phones, handheld bar code scanners, and even some
PDAs.
Manual (static) versus automatic (dynamic) WEP
WEP Cryptographic Operations
• Dynamic WEP
• The encryption keys used by the clients are distributed using key
encryption keys derived from strong authentication protocols.
• In this case, each station uses two keys.
1. mapping key, shared between the station and access point,
used to protect unicast frames.
2. default key, shared by all stations in the same service set, that
protects broadcast and multicast frames.
Manual (static) versus automatic (dynamic) WEP
WEP Cryptographic Operations
• Dynamic WEP advantages
• Keys are used less often and protects less traffic.
• Attackers have much less data to work for each key, making attacks
more time-consuming.
• At periodic intervals, the keys can be refreshed by the access point.
Manual (static) versus automatic (dynamic) WEP
WEP Cryptographic Operations
WEP key numbering and storage
WEP Cryptographic Operations
WEP key numbering and storage
Problems with WEP
Cryptographic Properties of RC4
• RC4 is remarkably simple to implement and considered to
be very strong if used in the right way.
• The basic idea behind RC4 encryption is to generate a
pseudorandom sequence of bytes called the key stream
that is then combined with the data using an exclusive OR
(XOR) operation
Problems with WEP
Problems with WEP
Cryptographic Properties of RC4
Problems with WEP
Cryptographic Properties of RC4
• Major weakness in any stream cipher - Reuse of the keystream
• XOR of the two encrypted packets is equivalent to the XOR of the
two plaintext packets
• By analyzing differences between the two streams in conjunction
with the structure of the frame body, attackers can learn about the
contents of the plaintext frames themselves
Problems with WEP
Cryptographic Properties of RC4
• To help prevent the reuse of the keystream, WEP uses the IV to
encrypt different packets with different RC4 keys.
• However, the IV is part of the packet header and is not encrypted.
Problems with WEP
Cryptographic Properties of RC4
• If IV’s repeat, confidentiality is at risk
– If we send two ciphertexts (C, C’) using the same IV, then the xor of
plaintexts leaks (P  P’ = C  C’), which might reveal both plaintexts
 Lesson: If RC4 isn’t used carefully, it becomes insecure
IV, P  RC4(K, IV)
IV, P’  RC4(K, IV)
Problems with WEP
Cryptographic Properties of RC4
• WEP uses CRC for integrity check but CRC is not
cryptographically secure.
• With CRC it is easy to predict how changing a single bit will
affect the result of the CRC calculation.
Design Flaws of the WEP System
Design Flaws of the WEP System
• As standardized, static WEP offers a shared secret of only 40
bits.
• WEP's use of the IV tips off an attacker to the reuse of a
keystream.
• IV space is quite small so repetitions are guaranteed on
busy networks
• Two frames that share the same IV almost certainly use
the same secret key and keystream.
Design Flaws of the WEP System
• Infrequent rekeying allows attackers to have Decryption
dictionaries
• large collections of frames encrypted with the same key
streams
• As more frames with the same IV pile up, more information
is available about the unencrypted frames even if the
secret key is not recovered
Design Flaws of the WEP System
• WEP uses a CRC for the integrity check.
• Although the value of the integrity check is encrypted by
the RC4 keystream, CRCs are not cryptographically secure.
• Use of a weak integrity check does not prevent determined
attackers from transparently modifying frames.
Design Flaws of the WEP System

More Related Content

What's hot

WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson
 
802.1x
802.1x802.1x
802.1x
akruthi k
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
Lopamudra Das
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
Al Imran, CISA
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
Dayanand Prabhakar
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
Peter R. Egli
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Voip security
Voip securityVoip security
Voip security
Shethwala Ridhvesh
 

What's hot (20)

WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
802.1x
802.1x802.1x
802.1x
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Iperf Tutorial
Iperf Tutorial Iperf Tutorial
Iperf Tutorial
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Voip security
Voip securityVoip security
Voip security
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 

Viewers also liked

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
Wep 2.0
Wep 2.0Wep 2.0
Wep 2.0
Edwin reyes
 
утасгүй сүлжээний нууцлал хамгаалалт
утасгүй сүлжээний       нууцлал хамгаалалтутасгүй сүлжээний       нууцлал хамгаалалт
утасгүй сүлжээний нууцлал хамгаалалтboldoo_hf
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Wireless
WirelessWireless
Wireless
Bat Suuri
 
утасгүй сүлжээний аюулгүй байдлын тухай.
утасгүй сүлжээний аюулгүй байдлын тухай.утасгүй сүлжээний аюулгүй байдлын тухай.
утасгүй сүлжээний аюулгүй байдлын тухай.Ochiroo Dorj
 
дотоод сүлжээний зохион байгуулалт
дотоод сүлжээний зохион байгуулалтдотоод сүлжээний зохион байгуулалт
дотоод сүлжээний зохион байгуулалт
Сандаг-Очир Жамъяндорж
 
утасгүй сүлжээ
утасгүй сүлжээутасгүй сүлжээ
утасгүй сүлжээOchiroo Dorj
 
утасгүй сүлжээ
утасгүй сүлжээутасгүй сүлжээ
утасгүй сүлжээOchiroo Dorj
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
Vpn
VpnVpn
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 

Viewers also liked (16)

802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
WEP
WEPWEP
WEP
 
Wep 2.0
Wep 2.0Wep 2.0
Wep 2.0
 
утасгүй сүлжээний нууцлал хамгаалалт
утасгүй сүлжээний       нууцлал хамгаалалтутасгүй сүлжээний       нууцлал хамгаалалт
утасгүй сүлжээний нууцлал хамгаалалт
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Wireless
WirelessWireless
Wireless
 
утасгүй сүлжээний аюулгүй байдлын тухай.
утасгүй сүлжээний аюулгүй байдлын тухай.утасгүй сүлжээний аюулгүй байдлын тухай.
утасгүй сүлжээний аюулгүй байдлын тухай.
 
дотоод сүлжээний зохион байгуулалт
дотоод сүлжээний зохион байгуулалтдотоод сүлжээний зохион байгуулалт
дотоод сүлжээний зохион байгуулалт
 
утасгүй сүлжээ
утасгүй сүлжээутасгүй сүлжээ
утасгүй сүлжээ
 
утасгүй сүлжээ
утасгүй сүлжээутасгүй сүлжээ
утасгүй сүлжээ
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Lab-7
Lab-7Lab-7
Lab-7
 
Vpn
VpnVpn
Vpn
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 

Similar to Wired equivalent privacy (wep)

WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
Huda Seyam
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
NotSure11
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
Mavaz
 
WEP .WAP WAP2.pptx
WEP .WAP WAP2.pptxWEP .WAP WAP2.pptx
WEP .WAP WAP2.pptx
kudakwashemakado1
 
chapter 8.ppt
chapter 8.pptchapter 8.ppt
chapter 8.ppt
KidaneKenenisa1
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptx
LucintaLuna4
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
JosephTesta9
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wireless security
Wireless securityWireless security
Wireless security
Razif Rahman
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
ImXaib
 
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgInformation Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Eric Vanderburg
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 

Similar to Wired equivalent privacy (wep) (20)

WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
WEP .WAP WAP2.pptx
WEP .WAP WAP2.pptxWEP .WAP WAP2.pptx
WEP .WAP WAP2.pptx
 
chapter 8.ppt
chapter 8.pptchapter 8.ppt
chapter 8.ppt
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptx
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wifi
WifiWifi
Wifi
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
 
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgInformation Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric Vanderburg
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 

More from akruthi k

Unit i-introduction
Unit i-introductionUnit i-introduction
Unit i-introduction
akruthi k
 
Pattern matching programs
Pattern matching programsPattern matching programs
Pattern matching programs
akruthi k
 
Kmp
KmpKmp
Boyer moore
Boyer mooreBoyer moore
Boyer moore
akruthi k
 
Physical layer overview
Physical layer overviewPhysical layer overview
Physical layer overview
akruthi k
 
Fhss
FhssFhss
Fhss
akruthi k
 
Dsss phy
Dsss phyDsss phy
Dsss phy
akruthi k
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
akruthi k
 
802.11i
802.11i802.11i
802.11i
akruthi k
 

More from akruthi k (9)

Unit i-introduction
Unit i-introductionUnit i-introduction
Unit i-introduction
 
Pattern matching programs
Pattern matching programsPattern matching programs
Pattern matching programs
 
Kmp
KmpKmp
Kmp
 
Boyer moore
Boyer mooreBoyer moore
Boyer moore
 
Physical layer overview
Physical layer overviewPhysical layer overview
Physical layer overview
 
Fhss
FhssFhss
Fhss
 
Dsss phy
Dsss phyDsss phy
Dsss phy
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
 
802.11i
802.11i802.11i
802.11i
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

Wired equivalent privacy (wep)

  • 2. • Cryptographic Background to WEP • WEP Cryptographic Operations • Problems with WEP • Dynamic WEP Contents
  • 3. • Guarding against traffic interception is the domain of cryptographic protocols. • two most commonly cited informal security objectives are 1. maintaining the secrecy of network data and 2. ensuring it has not been tampered with. • Initially ,WEP was the answer for wireless security. • WEP has many flaws, but better than nothing (very simple) WEP
  • 4.  WEP requires the use of the RC4 cipher (A stream cipher )  A stream cipher uses a stream of bits, called the keystream.  The keystream is then combined with the message to produce the ciphertext.  To recover the original message, the receiver processes the ciphertext with an identical keystream. Cryptographic Background to WEP
  • 5. Keyed stream cipher operation Most stream ciphers operate by taking a relatively short secret key and expanding it into a pseudorandom keystream the same length as the message. The pseudorandom number generator (PRNG) is a set of rules used to expand the key into a keystream. Cryptographic Background to WEP
  • 6. Cryptographic Background to WEP Stream Cipher Security • A totally random keystream is called a one-time pad and is the only known encryption scheme that is mathematically proven to protect against certain types of attacks. • One-time pads are not commonly used ,since • keystream must be perfectly random • the same length as the data • it can never be reused.
  • 7. WEP Cryptographic Operations 3 major objectives of security 1. Confidentiality : • protection against interception by unauthorized parties. • provided by encryption 2. Integrity : • make sure data has not been modified. • provided by integrity check sequence 3. Authentication and authorization • finding out who the user is . WEP uses 802.1x. • whether the access operation is allowed  WEP attempts to meet all these objectives
  • 8. WEP Cryptographic Operations • Confidentiality and integrity are handled simultaneously in WEP WEP Data Processing
  • 9. WEP Cryptographic Operations WEP Data Processing As input, WEP requires three items: 1. The payload to be protected 2. A secret key, used in frame encryption. WEP allows four keys to be stored simultaneously. 3. An initialization vector, used along with the secret key in frame transmission. After processing, WEP has a single output:  An encrypted frame, ready for transmission over an untrusted network with enough information to enable decryption at the remote end.
  • 10. WEP Cryptographic Operations WEP key length • The only key length present in the standard is a 64-bit WEP seed • 40 bits are shared, IV-24 bits • 128-bit WEP seed • 104 bits are a kept secret • One vendor even offers the option of using 256-bit secret keys • WEP, however, is not a well-designed cryptographic system, and the extra bits in the key buy you very little
  • 11. WEP Cryptographic Operations Types of WEP keys Two types of WEP keys • Default keys (broadcast keys) • Key mapping keys(unicast keys )
  • 12. WEP Cryptographic Operations • Each mobile device can have its own key value for unicast frame. • All users share a single default key. • The AP can operate with default keys and key mapping keys simultaneously; • When the AP receives a frame (or wants to send one), it looks in the key table to see whether there is an entry corresponding to the MAC address of the mobile. If it finds an entry, it uses it. If not, it uses the default key instead. Key Mapping Keys
  • 13. WEP Cryptographic Operations • WEP uses two key distribution schemes: Static WEP. • Administrators distribute single default key manually • Manual Key updates . • WEP without any key distribution mechanism is often called manual WEP or static WEP. • uses same key for all frames transmitted by every station • Static WEP is supported by Many low-power devices such as 802.11 phones, handheld bar code scanners, and even some PDAs. Manual (static) versus automatic (dynamic) WEP
  • 14. WEP Cryptographic Operations • Dynamic WEP • The encryption keys used by the clients are distributed using key encryption keys derived from strong authentication protocols. • In this case, each station uses two keys. 1. mapping key, shared between the station and access point, used to protect unicast frames. 2. default key, shared by all stations in the same service set, that protects broadcast and multicast frames. Manual (static) versus automatic (dynamic) WEP
  • 15. WEP Cryptographic Operations • Dynamic WEP advantages • Keys are used less often and protects less traffic. • Attackers have much less data to work for each key, making attacks more time-consuming. • At periodic intervals, the keys can be refreshed by the access point. Manual (static) versus automatic (dynamic) WEP
  • 16. WEP Cryptographic Operations WEP key numbering and storage
  • 17. WEP Cryptographic Operations WEP key numbering and storage
  • 18. Problems with WEP Cryptographic Properties of RC4 • RC4 is remarkably simple to implement and considered to be very strong if used in the right way. • The basic idea behind RC4 encryption is to generate a pseudorandom sequence of bytes called the key stream that is then combined with the data using an exclusive OR (XOR) operation
  • 20. Problems with WEP Cryptographic Properties of RC4
  • 21. Problems with WEP Cryptographic Properties of RC4 • Major weakness in any stream cipher - Reuse of the keystream • XOR of the two encrypted packets is equivalent to the XOR of the two plaintext packets • By analyzing differences between the two streams in conjunction with the structure of the frame body, attackers can learn about the contents of the plaintext frames themselves
  • 22. Problems with WEP Cryptographic Properties of RC4 • To help prevent the reuse of the keystream, WEP uses the IV to encrypt different packets with different RC4 keys. • However, the IV is part of the packet header and is not encrypted.
  • 23. Problems with WEP Cryptographic Properties of RC4 • If IV’s repeat, confidentiality is at risk – If we send two ciphertexts (C, C’) using the same IV, then the xor of plaintexts leaks (P  P’ = C  C’), which might reveal both plaintexts  Lesson: If RC4 isn’t used carefully, it becomes insecure IV, P  RC4(K, IV) IV, P’  RC4(K, IV)
  • 24. Problems with WEP Cryptographic Properties of RC4 • WEP uses CRC for integrity check but CRC is not cryptographically secure. • With CRC it is easy to predict how changing a single bit will affect the result of the CRC calculation.
  • 25. Design Flaws of the WEP System
  • 26. Design Flaws of the WEP System • As standardized, static WEP offers a shared secret of only 40 bits. • WEP's use of the IV tips off an attacker to the reuse of a keystream. • IV space is quite small so repetitions are guaranteed on busy networks • Two frames that share the same IV almost certainly use the same secret key and keystream.
  • 27. Design Flaws of the WEP System • Infrequent rekeying allows attackers to have Decryption dictionaries • large collections of frames encrypted with the same key streams • As more frames with the same IV pile up, more information is available about the unencrypted frames even if the secret key is not recovered
  • 28. Design Flaws of the WEP System • WEP uses a CRC for the integrity check. • Although the value of the integrity check is encrypted by the RC4 keystream, CRCs are not cryptographically secure. • Use of a weak integrity check does not prevent determined attackers from transparently modifying frames.
  • 29. Design Flaws of the WEP System