SlideShare une entreprise Scribd logo
1  sur  17
DEIOC




Authentication in wireless networks




                       Ludo Stoetenga
                      Chris van den Berg

                     Noordelijke Hogeschool Leeuwarden
DEIOC




Introduction

 ProjectObjectives
 Choices
  –   Network type
  –   Standards
 Types of Connections
 Encryption methods
 Conclusion
DEIOC




Project Objectives

 Investigate through documents and lecture
  studies about the subject and write a
  theoretical description about this.
 Implement one of the encryption methods in
  a Java based environment.
 Write a document how we implemented the
  authentications in Java.
DEIOC




Choices

 Network    types
  –   TTP (Trusted Third Party)
  –   Location Limited
  –   Chain of Thrust
 Standards
  –   802.11b (Wi-Fi)
  –   802.16 (Broadband Wireless Metropolitan Area
      Networks)
DEIOC




TTP (Trusted Third Party)

A  server that is trusted by the clients
 The server defines the protocol for secure
  connections.


                       TTP




     Client A                          Client B
DEIOC




Wireless

               There are two standards
          802.11                    802.16
   Wi-Fi                    MAN
   Authentication           Authentication
     – Open Key                – Open Key
     – Shared Key              – Shared Key
   Encryption               Encryption
     – RC4                     – RSA
                               – TripleDES
DEIOC




Connections

   Client connect with the TTP for the first time
   Client connect with a different Client
DEIOC




Client connect with the TTP


        Client                                                         TTP
                          Given a password (on a paper)




                 Agree on secret key by Diffie-Hellman key agreement



                   Send given password (encrypted with secret key)



                  Send new password (encrypted with secret key)
DEIOC




Client connect with a different Client

        Client A        Agree on Connection               Client B




                                  TTP

                   Get keys from the TTP encrypted with
                             Shared Secret key




                     Send data encrypted with the keys
                           provided by the TTP
DEIOC




Encryption methods

 Diffie-Hellman
              key agreement
 Lamport Scheme
 RSA
 RC4
 TripleDES
DEIOC




 Diffie-Hellman key agreement


                      A                                                   B
                          A and B agree on: P (prime) and G (1 > g > p)


Gen X (0 > x > p-1)                            Gx

                                                                              Gen Y (0 > x > p-1)
                                               Gy




                             A and B can both Compute Gxy
                               Gxy is the Shared secret Key
DEIOC




Lamport scheme

   Shared secret key
   40-bits key



Shared Secret Key


                    One way function   New Shared Secret Key


    Key (40 bits)
DEIOC




RSA

• 2 large primes P and Q
• Compute N = P * Q and F = (P-1)(Q-1)              • N modules
• Select Random: E, 1 < E < F ( gcd(E,F)=1 )        • E Encryption exponent
• Select Unique: D, 1 < D < F ( E * D = 1 (mod F)   • D Decryption Exponent




                A                                      B
                                 Send N, E


                               C = ME mod N
                                                            M = CD mod N
DEIOC




RC4

                     A                                      B
                                Shared secret Key


Encrypt Plain Text
 with Secret Key                  Cipher Text
                                                                Decrypt Cipher text
                                                                 with Secret Key


     • RC4 uses a variable length key from 1 to 256 bytes
     • The stream cipher uses swap and modulate operations to encrypt
DEIOC




DES

              A                                              B
                              Shared secret Key


                                 Cipher Text


                                Encryption
                  L0            L1                    L16
Input                                                                        output
        IP                                                            FP
                  R0      L0 + F(R0,key1)      L15 + F(R15,key16)


 Decryption is simply the inverse of encryption, following the same steps
 as above, but reversing the order in which the subkeys are applied.
 Blocksize is 64 bits
DEIOC




TripleDES

   Triple-DES is just DES with two 48-bit key array’s
    applied in 3 rounds


                            Encryption


      Encrypt (key 1)     Decrypt (key 2)    Encrypt (key 1)



                            Decryption

      Decrypt (key 1)     Encrypt (key 2)    Decrypt (key 1)
DEIOC




Conclusion

 Encryption   methods are not secure
  –   Methods are insecure
  –   Errors by programming
 Standards
  –   RC4
  –   RSA
  –   TripleDES

Contenu connexe

Tendances

Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 

Tendances (20)

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Ch9
Ch9Ch9
Ch9
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
661 665
661 665661 665
661 665
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Unit 1
Unit 1Unit 1
Unit 1
 
Kleptography
KleptographyKleptography
Kleptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 

En vedette

Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Shreyas Tote
 

En vedette (8)

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Network security
Network securityNetwork security
Network security
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 

Similaire à Authentication in Wireless Networks

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
DefconRussia
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
ams1ams11
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
ajithc0003
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 

Similaire à Authentication in Wireless Networks (20)

Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gataka
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Internet security
Internet securityInternet security
Internet security
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Day-3 PowerPoint
Day-3 PowerPointDay-3 PowerPoint
Day-3 PowerPoint
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 

Plus de Chris van den Berg

Plus de Chris van den Berg (10)

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - Telegraaf
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performance
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana Connect
 
Gamify a contact center
Gamify a contact centerGamify a contact center
Gamify a contact center
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ Coniche
 
Result of the pilot by CAIWAY
Result of the pilot by CAIWAYResult of the pilot by CAIWAY
Result of the pilot by CAIWAY
 
Gamify a callcenter?
Gamify a callcenter?Gamify a callcenter?
Gamify a callcenter?
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - Platform
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influence
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijs
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Authentication in Wireless Networks

  • 1. DEIOC Authentication in wireless networks Ludo Stoetenga Chris van den Berg Noordelijke Hogeschool Leeuwarden
  • 2. DEIOC Introduction  ProjectObjectives  Choices – Network type – Standards  Types of Connections  Encryption methods  Conclusion
  • 3. DEIOC Project Objectives  Investigate through documents and lecture studies about the subject and write a theoretical description about this.  Implement one of the encryption methods in a Java based environment.  Write a document how we implemented the authentications in Java.
  • 4. DEIOC Choices  Network types – TTP (Trusted Third Party) – Location Limited – Chain of Thrust  Standards – 802.11b (Wi-Fi) – 802.16 (Broadband Wireless Metropolitan Area Networks)
  • 5. DEIOC TTP (Trusted Third Party) A server that is trusted by the clients  The server defines the protocol for secure connections. TTP Client A Client B
  • 6. DEIOC Wireless There are two standards 802.11 802.16  Wi-Fi  MAN  Authentication  Authentication – Open Key – Open Key – Shared Key – Shared Key  Encryption  Encryption – RC4 – RSA – TripleDES
  • 7. DEIOC Connections  Client connect with the TTP for the first time  Client connect with a different Client
  • 8. DEIOC Client connect with the TTP Client TTP Given a password (on a paper) Agree on secret key by Diffie-Hellman key agreement Send given password (encrypted with secret key) Send new password (encrypted with secret key)
  • 9. DEIOC Client connect with a different Client Client A Agree on Connection Client B TTP Get keys from the TTP encrypted with Shared Secret key Send data encrypted with the keys provided by the TTP
  • 10. DEIOC Encryption methods  Diffie-Hellman key agreement  Lamport Scheme  RSA  RC4  TripleDES
  • 11. DEIOC Diffie-Hellman key agreement A B A and B agree on: P (prime) and G (1 > g > p) Gen X (0 > x > p-1) Gx Gen Y (0 > x > p-1) Gy A and B can both Compute Gxy Gxy is the Shared secret Key
  • 12. DEIOC Lamport scheme  Shared secret key  40-bits key Shared Secret Key One way function New Shared Secret Key Key (40 bits)
  • 13. DEIOC RSA • 2 large primes P and Q • Compute N = P * Q and F = (P-1)(Q-1) • N modules • Select Random: E, 1 < E < F ( gcd(E,F)=1 ) • E Encryption exponent • Select Unique: D, 1 < D < F ( E * D = 1 (mod F) • D Decryption Exponent A B Send N, E C = ME mod N M = CD mod N
  • 14. DEIOC RC4 A B Shared secret Key Encrypt Plain Text with Secret Key Cipher Text Decrypt Cipher text with Secret Key • RC4 uses a variable length key from 1 to 256 bytes • The stream cipher uses swap and modulate operations to encrypt
  • 15. DEIOC DES A B Shared secret Key Cipher Text Encryption L0 L1 L16 Input output IP FP R0 L0 + F(R0,key1) L15 + F(R15,key16)  Decryption is simply the inverse of encryption, following the same steps as above, but reversing the order in which the subkeys are applied.  Blocksize is 64 bits
  • 16. DEIOC TripleDES  Triple-DES is just DES with two 48-bit key array’s applied in 3 rounds Encryption Encrypt (key 1) Decrypt (key 2) Encrypt (key 1) Decryption Decrypt (key 1) Encrypt (key 2) Decrypt (key 1)
  • 17. DEIOC Conclusion  Encryption methods are not secure – Methods are insecure – Errors by programming  Standards – RC4 – RSA – TripleDES