Wi fi security

V
Wi-Fi Security
Prepaired By:
Virendra Singh Thakur
GTU PG School, Ahmeadabad
 Originally, Wi-Fi was a marketing term. The Wi-Fi
certified logo means that the product has passed
interoperability tests Currently Wi-Fi means wireless
networks in general
WHAT IS WIFI ?
Wireless networks are usually based on the IEEE 802.11
standards.
a. IEEE 802 series standards
a. 802.11 – wireless LANs
b. 802.15 – wireless personal area networks (e.g., Bluetooth)
c. 802.16 – wireless broadband up to 155Mb, wireless ISPs
b. 802.11a – 54 Mbps@5 GHz
a. Not interoperable with 802.11b
b. Limited distance
c. Dual-mode APs require 2 chipsets, look like two APs to
clients
d. Cisco products: Aironet 1200
CONTD…
a. 802.11b – 11 Mbps@2.4 GHz
a. Full speed up to 300 feet
b. Coverage up to 1750 feet
c. Cisco products: Aironet 340, 350, 1100, 1200
b. 802.11g – 54 Mbps@2.4 GHz
a. Same range as 802.11b
b. Backward-compatible with 802.11b
c. Speeds slower in dual-mode
d. Cisco products: Aironet 1100, 1200
• 802.11e – QoS
• Dubbed “Wireless MultiMedia (WMM)” by Wi-Fi Alliance
• 802.11i – Security
• Adds AES encryption
• Requires high cpu, new chips required
• TKIP is interim solution.
IEEE 802.11 standards. (Contd..)
CONTD…
a. 802.11n –(2009)
a. up to 300Mbps
b. 5Ghz and/or 2.4Ghz
c. ~230ft range
b. 802.11ac – (under development)
a. Will provide high through put in the 5 GHz band
b. Will use wider RF bandwidth
c. will enable multi-station WLAN throughput of at
least 1 Gbps
d. a maximum single link throughput of at least 500
Mbps
WIRELESS NETWORK MODES
• The 802.11 wireless networks operate in two basic
modes:
• Infrastructure mode
• Ad-hoc mode
• Infrastructure mode:
• each wireless client connects directly to a central device
called Access Point (AP)
• no direct connection between wireless clients
• AP acts as a wireless hub that performs the connections and
handles them between wireless clients
CONTD..
• Ad-hoc mode:
• Each wireless client connects directly with each other
• No central device managing the connections
• Rapid deployment of a temporal network where no
infrastructures exist (advantage in case of disaster…)
• Each node must maintain its proper authentication list.
Wi-Fi Security Techniques
• Wired Equivalent Privacy (WEP)
• Wireless Protected Access (WPA)
• Wireless Protected Access2 (WPA2)
WIRED EQUIVALENT PRIVACY (WEP)
• Short for Wired Equivalent Privacy, a security protocol for
wireless local area networks (WLANs) defined in the 802.11b
standard. WEP is designed to provide the same level of
security as that of a wired LAN.
• WEP aims to provide security by encrypting data over radio
waves so that it is protected as it is transmitted from one end
point to another. However, it has been found that WEP is not
as secure as once believed. WEP is used at the two lowest
layers of the OSI model - the data link and physical layers; it
therefore does not offer end-to-end security.
1.Appends a 32-bit CRC checksum to each outgoing frame (INTEGRITY)
2.Encrypts the frame using RC4 stream cipher = 40-bit (standard) or 104-bit
(Enhanced) message keys + a 24-bit IV random initialization vector
(CONFIDENTIALITY).
3.The Initialization Vector (IV) and default key on the station access point are
used to create a key stream
4.The key stream is then used to convert the plain text message into the WEP
encrypted frame.
Wired Equivalent Privacy (WEP) Contd..
Wired Equivalent Privacy (WEP) Contd..
• Short for Wi-Fi Protected Access, a Wi-Fi standard that was
designed to improve upon the security features of WEP. The
technology is designed to work with existing Wi-Fi products that
have been enabled with WEP (i.e., as a software upgrade to existing
hardware), but the technology includes two improvements over
WEP:
WPA - WI-FI PROTECTED ACCESS
New technique in 2002
replacement of security flaws of WEP.
Improved data encryption
Strong user authentication
Because of many attacks related to static key, WPA
minimize shared secret key in accordance with the frame
transmission.
Use the RC4 algorithm in a proper way and provide fast
transfer of the data before someone can decrypt the data.
WPA - WI-FI PROTECTED ACCESS
Data is encrypted using the RC4 stream cipher, with a 128-bit key and
a 48-bit initialization vector (IV).
One major improvement in WPA over WEP is the Temporal Key
Integrity Protocol (TKIP), which dynamically changes keys as the
system is used.
When combined with the much larger IV, this defeats the well-known
key recovery attacks on WEP.
WPA also provides vastly improved payload integrity.
WPA - WI-FI PROTECTED ACCESS
WPA2 - WI-FI PROTECTED ACCESS 2
• Based on the IEEE 802.i standard
• 2 versions: Personal & Enterprise
• The primary enhancement over WPA is the use of the AES (Advanced
Encryption Standard) algorithm
• The encryption in WPA2 is done by utilizing either AES or TKIP
• The Personal mode uses a PSK (Pre-shared key) & does not require a
separate authentication of users
• The enterprise mode requires the users to be separately authenticated
by using the EAP protocol
WPA2 - WI-FI PROTECTED ACCESS 2
WPA uses AES with a key length of 128 bit to encrypt the data
The AES uses the Counter-Mode/CBC-MAC Protocol (CCMP)
The CCMP uses the same key for both encryption and authentication,
but with different initialization vectors.
• WPA2 has immunity against many types of hacker attacks
• Man-in-the middle
• Authentication forging
• Replay
• Key collision
• Weak keys
• Packet forging
• Dictionary attacks
WPA2 - WI-FI PROTECTED ACCESS 2
WEP VS WPA VS WPA2
WEP WPA WPA2
ENCRYPTION RC4 RC4 AES
KEY ROTATION NONE Dynamic
Session Keys
Dynamic Session
Keys
KEY
DISTRIBUTION
Manually typed
into each device
Automatic
distribution
available
Automatic
distribution
available
AUTHENTICATION Uses WEP key as
Authentication
Can use 802.1x
& EAP
Can use 802.1x &
EAP
Thank you
1 sur 20

Recommandé

Wi-Fi security – WEP, WPA and WPA2 par
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
4.4K vues14 diapositives
Wi Fi Security par
Wi Fi SecurityWi Fi Security
Wi Fi Securityyousef emami
4.5K vues20 diapositives
Wpa vs Wpa2 par
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2Nzava Luwawa
3.9K vues30 diapositives
Wifi Security par
Wifi SecurityWifi Security
Wifi SecurityAgris Ameriks
3.7K vues14 diapositives
Wireless Security null seminar par
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
4.2K vues51 diapositives
Wireless Device and Network level security par
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
1.7K vues42 diapositives

Contenu connexe

Tendances

Wired equivalent privacy (wep) par
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)akruthi k
1.8K vues29 diapositives
WiFi Secuiry: Attack & Defence par
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefencePrakashchand Suthar
16.2K vues49 diapositives
Wifi Security par
Wifi SecurityWifi Security
Wifi SecurityShital Kat
2.4K vues28 diapositives
Wireless security using wpa2 par
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
3.3K vues22 diapositives
Wireless network security par
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
8.3K vues29 diapositives
Wireless security presentation par
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
40.5K vues21 diapositives

Tendances(20)

Wired equivalent privacy (wep) par akruthi k
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
akruthi k1.8K vues
Wireless security using wpa2 par Tushar Anand
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand3.3K vues
Wireless security presentation par Muhammad Zia
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia40.5K vues
Wireless Network Security par kentquirk
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk1.1K vues
WEP/WPA attacks par Huda Seyam
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
Huda Seyam1.5K vues
Wpa2 psk security measure par Shivam Singh
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh957 vues
Implementing 802.1x Authentication par dkaya
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya15.3K vues
Chapter 7 - Wireless Network Security.pptx par AmanuelZewdie4
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4165 vues
Advanced Wi-Fi pentesting par Yunfei Yang
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
Yunfei Yang762 vues

Similaire à Wi fi security

Shashank wireless lans security par
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans securityShashank Srivastava
760 vues26 diapositives
wi-fi technology par
wi-fi technologywi-fi technology
wi-fi technologytardeep
1.4K vues40 diapositives
Wifi par
WifiWifi
WifiTheSmit Chheda
323 vues40 diapositives
5169 wireless network_security_amine_k par
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
937 vues47 diapositives
4 wifi security par
4 wifi security4 wifi security
4 wifi securityal-sari7
1.1K vues27 diapositives
Wi fi par
Wi fiWi fi
Wi fikendre1234
240 vues22 diapositives

Similaire à Wi fi security(20)

wi-fi technology par tardeep
wi-fi technologywi-fi technology
wi-fi technology
tardeep1.4K vues
5169 wireless network_security_amine_k par Rama Krishna M
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M937 vues
4 wifi security par al-sari7
4 wifi security4 wifi security
4 wifi security
al-sari71.1K vues
Wifi vignan final par PREMKUMAR
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR563 vues
Wireless security par paripec
Wireless securityWireless security
Wireless security
paripec1.5K vues
Topic 4.0 wireless technology par Atika Zaimi
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
Atika Zaimi423 vues
Recent Trends in Wireless communication par JigsAshley
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley12 vues
Understanding IT Network Security for Wireless and Wired Measurement Applicat... par cmstiernberg
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg801 vues
IJCER (www.ijceronline.com) International Journal of computational Engineerin... par ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline196 vues
WPA3 - What is it good for? par Tom Isaacson
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson1.2K vues
Security Issues of 802.11b par guestd7b627
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627392 vues

Plus de Virendra Thakur

Internet of things for the “smart home” par
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”Virendra Thakur
3.9K vues24 diapositives
Internet of Things (IoT) par
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Virendra Thakur
1.1K vues19 diapositives
Wireless Sensor Network Routing Protocols par
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
596 vues77 diapositives
Wireless Sensor Network Routing Protocols par
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
8K vues77 diapositives
Software Configuration Management par
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementVirendra Thakur
854 vues15 diapositives
Touch id in iphone 5s par
Touch id in iphone 5sTouch id in iphone 5s
Touch id in iphone 5sVirendra Thakur
657 vues13 diapositives

Plus de Virendra Thakur(6)

Dernier

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... par
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
184 vues12 diapositives
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... par
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
126 vues10 diapositives
Ransomware is Knocking your Door_Final.pdf par
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
96 vues46 diapositives
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
161 vues13 diapositives
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ par
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
130 vues9 diapositives
Initiating and Advancing Your Strategic GIS Governance Strategy par
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategySafe Software
176 vues68 diapositives

Dernier(20)

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... par ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 vues
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... par ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 vues
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 vues
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ par ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 vues
Initiating and Advancing Your Strategic GIS Governance Strategy par Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 vues
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates par ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 vues
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... par ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 vues
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... par Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker54 vues
The Role of Patterns in the Era of Large Language Models par Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 vues
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... par ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue159 vues
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... par ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 vues
Business Analyst Series 2023 - Week 4 Session 7 par DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 vues
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 vues
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... par ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 vues
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue par ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 vues
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... par ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 vues

Wi fi security

  • 1. Wi-Fi Security Prepaired By: Virendra Singh Thakur GTU PG School, Ahmeadabad
  • 2.  Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests Currently Wi-Fi means wireless networks in general WHAT IS WIFI ?
  • 3. Wireless networks are usually based on the IEEE 802.11 standards. a. IEEE 802 series standards a. 802.11 – wireless LANs b. 802.15 – wireless personal area networks (e.g., Bluetooth) c. 802.16 – wireless broadband up to 155Mb, wireless ISPs b. 802.11a – 54 Mbps@5 GHz a. Not interoperable with 802.11b b. Limited distance c. Dual-mode APs require 2 chipsets, look like two APs to clients d. Cisco products: Aironet 1200
  • 4. CONTD… a. 802.11b – 11 Mbps@2.4 GHz a. Full speed up to 300 feet b. Coverage up to 1750 feet c. Cisco products: Aironet 340, 350, 1100, 1200 b. 802.11g – 54 Mbps@2.4 GHz a. Same range as 802.11b b. Backward-compatible with 802.11b c. Speeds slower in dual-mode d. Cisco products: Aironet 1100, 1200
  • 5. • 802.11e – QoS • Dubbed “Wireless MultiMedia (WMM)” by Wi-Fi Alliance • 802.11i – Security • Adds AES encryption • Requires high cpu, new chips required • TKIP is interim solution. IEEE 802.11 standards. (Contd..)
  • 6. CONTD… a. 802.11n –(2009) a. up to 300Mbps b. 5Ghz and/or 2.4Ghz c. ~230ft range b. 802.11ac – (under development) a. Will provide high through put in the 5 GHz band b. Will use wider RF bandwidth c. will enable multi-station WLAN throughput of at least 1 Gbps d. a maximum single link throughput of at least 500 Mbps
  • 7. WIRELESS NETWORK MODES • The 802.11 wireless networks operate in two basic modes: • Infrastructure mode • Ad-hoc mode • Infrastructure mode: • each wireless client connects directly to a central device called Access Point (AP) • no direct connection between wireless clients • AP acts as a wireless hub that performs the connections and handles them between wireless clients
  • 8. CONTD.. • Ad-hoc mode: • Each wireless client connects directly with each other • No central device managing the connections • Rapid deployment of a temporal network where no infrastructures exist (advantage in case of disaster…) • Each node must maintain its proper authentication list.
  • 9. Wi-Fi Security Techniques • Wired Equivalent Privacy (WEP) • Wireless Protected Access (WPA) • Wireless Protected Access2 (WPA2)
  • 10. WIRED EQUIVALENT PRIVACY (WEP) • Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. • WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.
  • 11. 1.Appends a 32-bit CRC checksum to each outgoing frame (INTEGRITY) 2.Encrypts the frame using RC4 stream cipher = 40-bit (standard) or 104-bit (Enhanced) message keys + a 24-bit IV random initialization vector (CONFIDENTIALITY). 3.The Initialization Vector (IV) and default key on the station access point are used to create a key stream 4.The key stream is then used to convert the plain text message into the WEP encrypted frame. Wired Equivalent Privacy (WEP) Contd..
  • 12. Wired Equivalent Privacy (WEP) Contd..
  • 13. • Short for Wi-Fi Protected Access, a Wi-Fi standard that was designed to improve upon the security features of WEP. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP (i.e., as a software upgrade to existing hardware), but the technology includes two improvements over WEP: WPA - WI-FI PROTECTED ACCESS
  • 14. New technique in 2002 replacement of security flaws of WEP. Improved data encryption Strong user authentication Because of many attacks related to static key, WPA minimize shared secret key in accordance with the frame transmission. Use the RC4 algorithm in a proper way and provide fast transfer of the data before someone can decrypt the data. WPA - WI-FI PROTECTED ACCESS
  • 15. Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP. WPA also provides vastly improved payload integrity. WPA - WI-FI PROTECTED ACCESS
  • 16. WPA2 - WI-FI PROTECTED ACCESS 2 • Based on the IEEE 802.i standard • 2 versions: Personal & Enterprise • The primary enhancement over WPA is the use of the AES (Advanced Encryption Standard) algorithm • The encryption in WPA2 is done by utilizing either AES or TKIP • The Personal mode uses a PSK (Pre-shared key) & does not require a separate authentication of users • The enterprise mode requires the users to be separately authenticated by using the EAP protocol
  • 17. WPA2 - WI-FI PROTECTED ACCESS 2 WPA uses AES with a key length of 128 bit to encrypt the data The AES uses the Counter-Mode/CBC-MAC Protocol (CCMP) The CCMP uses the same key for both encryption and authentication, but with different initialization vectors.
  • 18. • WPA2 has immunity against many types of hacker attacks • Man-in-the middle • Authentication forging • Replay • Key collision • Weak keys • Packet forging • Dictionary attacks WPA2 - WI-FI PROTECTED ACCESS 2
  • 19. WEP VS WPA VS WPA2 WEP WPA WPA2 ENCRYPTION RC4 RC4 AES KEY ROTATION NONE Dynamic Session Keys Dynamic Session Keys KEY DISTRIBUTION Manually typed into each device Automatic distribution available Automatic distribution available AUTHENTICATION Uses WEP key as Authentication Can use 802.1x & EAP Can use 802.1x & EAP