SlideShare une entreprise Scribd logo
1  sur  17
DEIOC




Authentication in wireless networks




                       Ludo Stoetenga
                      Chris van den Berg

                     Noordelijke Hogeschool Leeuwarden
DEIOC




Introduction

 ProjectObjectives
 Choices
  –   Network type
  –   Standards
 Types of Connections
 Encryption methods
 Conclusion
DEIOC




Project Objectives

 Investigate through documents and lecture
  studies about the subject and write a
  theoretical description about this.
 Implement one of the encryption methods in
  a Java based environment.
 Write a document how we implemented the
  authentications in Java.
DEIOC




Choices

 Network    types
  –   TTP (Trusted Third Party)
  –   Location Limited
  –   Chain of Thrust
 Standards
  –   802.11b (Wi-Fi)
  –   802.16 (Broadband Wireless Metropolitan Area
      Networks)
DEIOC




TTP (Trusted Third Party)

A  server that is trusted by the clients
 The server defines the protocol for secure
  connections.


                       TTP




     Client A                          Client B
DEIOC




Wireless

               There are two standards
          802.11                    802.16
   Wi-Fi                    MAN
   Authentication           Authentication
     – Open Key                – Open Key
     – Shared Key              – Shared Key
   Encryption               Encryption
     – RC4                     – RSA
                               – TripleDES
DEIOC




Connections

   Client connect with the TTP for the first time
   Client connect with a different Client
DEIOC




Client connect with the TTP


        Client                                                         TTP
                          Given a password (on a paper)




                 Agree on secret key by Diffie-Hellman key agreement



                   Send given password (encrypted with secret key)



                  Send new password (encrypted with secret key)
DEIOC




Client connect with a different Client

        Client A        Agree on Connection               Client B




                                  TTP

                   Get keys from the TTP encrypted with
                             Shared Secret key




                     Send data encrypted with the keys
                           provided by the TTP
DEIOC




Encryption methods

 Diffie-Hellman
              key agreement
 Lamport Scheme
 RSA
 RC4
 TripleDES
DEIOC




 Diffie-Hellman key agreement


                      A                                                   B
                          A and B agree on: P (prime) and G (1 > g > p)


Gen X (0 > x > p-1)                            Gx

                                                                              Gen Y (0 > x > p-1)
                                               Gy




                             A and B can both Compute Gxy
                               Gxy is the Shared secret Key
DEIOC




Lamport scheme

   Shared secret key
   40-bits key



Shared Secret Key


                    One way function   New Shared Secret Key


    Key (40 bits)
DEIOC




RSA

• 2 large primes P and Q
• Compute N = P * Q and F = (P-1)(Q-1)              • N modules
• Select Random: E, 1 < E < F ( gcd(E,F)=1 )        • E Encryption exponent
• Select Unique: D, 1 < D < F ( E * D = 1 (mod F)   • D Decryption Exponent




                A                                      B
                                 Send N, E


                               C = ME mod N
                                                            M = CD mod N
DEIOC




RC4

                     A                                      B
                                Shared secret Key


Encrypt Plain Text
 with Secret Key                  Cipher Text
                                                                Decrypt Cipher text
                                                                 with Secret Key


     • RC4 uses a variable length key from 1 to 256 bytes
     • The stream cipher uses swap and modulate operations to encrypt
DEIOC




DES

              A                                              B
                              Shared secret Key


                                 Cipher Text


                                Encryption
                  L0            L1                    L16
Input                                                                        output
        IP                                                            FP
                  R0      L0 + F(R0,key1)      L15 + F(R15,key16)


 Decryption is simply the inverse of encryption, following the same steps
 as above, but reversing the order in which the subkeys are applied.
 Blocksize is 64 bits
DEIOC




TripleDES

   Triple-DES is just DES with two 48-bit key array’s
    applied in 3 rounds


                            Encryption


      Encrypt (key 1)     Decrypt (key 2)    Encrypt (key 1)



                            Decryption

      Decrypt (key 1)     Encrypt (key 2)    Decrypt (key 1)
DEIOC




Conclusion

 Encryption   methods are not secure
  –   Methods are insecure
  –   Errors by programming
 Standards
  –   RC4
  –   RSA
  –   TripleDES

Contenu connexe

Tendances

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryptionAlexander Decker
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
A TLS Story
A TLS StoryA TLS Story
A TLS Storyereddick
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 

Tendances (20)

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Ch9
Ch9Ch9
Ch9
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
661 665
661 665661 665
661 665
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Unit 1
Unit 1Unit 1
Unit 1
 
Kleptography
KleptographyKleptography
Kleptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 

En vedette

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authenticationamanchaurasia
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksLeMeniz Infotech
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 

En vedette (8)

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Network security
Network securityNetwork security
Network security
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 

Similaire à Authentication in Wireless Networks

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gatakajiboutin
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gatakaDefconRussia
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingajithc0003
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 

Similaire à Authentication in Wireless Networks (20)

Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gataka
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Internet security
Internet securityInternet security
Internet security
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Day-3 PowerPoint
Day-3 PowerPointDay-3 PowerPoint
Day-3 PowerPoint
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 

Plus de Chris van den Berg

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafChris van den Berg
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performanceChris van den Berg
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectChris van den Berg
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheChris van den Berg
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - PlatformChris van den Berg
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influenceChris van den Berg
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsChris van den Berg
 

Plus de Chris van den Berg (10)

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - Telegraaf
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performance
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana Connect
 
Gamify a contact center
Gamify a contact centerGamify a contact center
Gamify a contact center
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ Coniche
 
Result of the pilot by CAIWAY
Result of the pilot by CAIWAYResult of the pilot by CAIWAY
Result of the pilot by CAIWAY
 
Gamify a callcenter?
Gamify a callcenter?Gamify a callcenter?
Gamify a callcenter?
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - Platform
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influence
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijs
 

Dernier

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Dernier (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Authentication in Wireless Networks

  • 1. DEIOC Authentication in wireless networks Ludo Stoetenga Chris van den Berg Noordelijke Hogeschool Leeuwarden
  • 2. DEIOC Introduction  ProjectObjectives  Choices – Network type – Standards  Types of Connections  Encryption methods  Conclusion
  • 3. DEIOC Project Objectives  Investigate through documents and lecture studies about the subject and write a theoretical description about this.  Implement one of the encryption methods in a Java based environment.  Write a document how we implemented the authentications in Java.
  • 4. DEIOC Choices  Network types – TTP (Trusted Third Party) – Location Limited – Chain of Thrust  Standards – 802.11b (Wi-Fi) – 802.16 (Broadband Wireless Metropolitan Area Networks)
  • 5. DEIOC TTP (Trusted Third Party) A server that is trusted by the clients  The server defines the protocol for secure connections. TTP Client A Client B
  • 6. DEIOC Wireless There are two standards 802.11 802.16  Wi-Fi  MAN  Authentication  Authentication – Open Key – Open Key – Shared Key – Shared Key  Encryption  Encryption – RC4 – RSA – TripleDES
  • 7. DEIOC Connections  Client connect with the TTP for the first time  Client connect with a different Client
  • 8. DEIOC Client connect with the TTP Client TTP Given a password (on a paper) Agree on secret key by Diffie-Hellman key agreement Send given password (encrypted with secret key) Send new password (encrypted with secret key)
  • 9. DEIOC Client connect with a different Client Client A Agree on Connection Client B TTP Get keys from the TTP encrypted with Shared Secret key Send data encrypted with the keys provided by the TTP
  • 10. DEIOC Encryption methods  Diffie-Hellman key agreement  Lamport Scheme  RSA  RC4  TripleDES
  • 11. DEIOC Diffie-Hellman key agreement A B A and B agree on: P (prime) and G (1 > g > p) Gen X (0 > x > p-1) Gx Gen Y (0 > x > p-1) Gy A and B can both Compute Gxy Gxy is the Shared secret Key
  • 12. DEIOC Lamport scheme  Shared secret key  40-bits key Shared Secret Key One way function New Shared Secret Key Key (40 bits)
  • 13. DEIOC RSA • 2 large primes P and Q • Compute N = P * Q and F = (P-1)(Q-1) • N modules • Select Random: E, 1 < E < F ( gcd(E,F)=1 ) • E Encryption exponent • Select Unique: D, 1 < D < F ( E * D = 1 (mod F) • D Decryption Exponent A B Send N, E C = ME mod N M = CD mod N
  • 14. DEIOC RC4 A B Shared secret Key Encrypt Plain Text with Secret Key Cipher Text Decrypt Cipher text with Secret Key • RC4 uses a variable length key from 1 to 256 bytes • The stream cipher uses swap and modulate operations to encrypt
  • 15. DEIOC DES A B Shared secret Key Cipher Text Encryption L0 L1 L16 Input output IP FP R0 L0 + F(R0,key1) L15 + F(R15,key16)  Decryption is simply the inverse of encryption, following the same steps as above, but reversing the order in which the subkeys are applied.  Blocksize is 64 bits
  • 16. DEIOC TripleDES  Triple-DES is just DES with two 48-bit key array’s applied in 3 rounds Encryption Encrypt (key 1) Decrypt (key 2) Encrypt (key 1) Decryption Decrypt (key 1) Encrypt (key 2) Decrypt (key 1)
  • 17. DEIOC Conclusion  Encryption methods are not secure – Methods are insecure – Errors by programming  Standards – RC4 – RSA – TripleDES