Chapter 1: Foundation



Download 0,82 Mb.
bet23/23
Sana21.01.2022
Hajmi0,82 Mb.
#395630
1   ...   15   16   17   18   19   20   21   22   23
Bog'liq
27-маъруза Tarmoqlar va tarmoqlararo axborotlarni himoyalash usullari va vositalari.

Wireless Security

  • WEP (Wired Equivalent Privacy)
    • was meant to provide users privacy equivalent to that of a dedicated wire (immunity to most eavesdropping and impersonation attacks)
    • WEP uses an encryption key shared between the client and the access point
    • To authenticate a user
      • the access point sends a random number to the client,
      • the client encrypts the number using the shared key
      • and returns to the access point.
      • From that point on, the client and access point are authenticated and can communicate using their shared encryption key.

Wireless Security

  • WEP (wired equivalent privacy)
    • Problems with WEP
      • First, the WEP standard uses either a 64- or 128-bit encryption key
        • The user enters the key in any convenient form, usually in hexadecimal or as an alphanumeric string that is converted to a number
        • Not surprisingly, hex strings like C0DE C0DE… (that is a zero between C and D) are common.
        • Thus, Passphrases are vulnerable to a dictionary attack.
      • Even if the key is strong, it really has an effective length of only 40 or 104 bits because of the way it is used in the algorithm (RC4).
        • Several tools, starting with WEPCrack and AirSnort, allow an attacker to crack a WEP encryption, usually in a few minutes
        • At a 2005 conference, the FBI demonstrated the ease with which a WEP-secured wireless session can be broken.

Wireless Security

  • WPA and WPA2
    • The alternative to WEP is WiFi Protected Access or WPA, approved in 2003.
  • How does WPA improve upon WEP?
    • First, WEP uses an encryption key that is unchanged until the user enters a new key at the client and access point
      • WPA has a key change approach, called Temporal Key Integrity Program (TKIP), by which the encryption key is changed automatically on each packet.
    • Second, WEP uses the encryption key as an authenticator
      • WPA employs the extensible authentication protocol (EAP) by which authentication can be done by password, token, certificate, or other mechanism.
      • For small network (home) users, this probably still means a shared secret, which is not ideal.
        • Users are prone to selecting weak keys, such as short numbers or pass phrases subject to a dictionary attack.

Wireless Security

    • Third, the encryption algorithm for WEP is RC4
      • which has cryptographic flaws both in key length and design
      • In WEP the initialization vector for RC4 is only 24 bits, a size so small that collisions commonly occur
      • there is no check against initialization vector reuse
      • WPA2 adds AES as a possible encryption algorithm (although RC4 is also still supported for compatibility reasons)
    • WEP includes a 32-bit integrity check separate from the data portion.
      • because the WEP encryption is subject to cryptanalytic attack, the integrity check was also subject
      • WPA includes a 64-bit integrity check that is encrypted.
    • Setup for WPA involves three protocol steps: authentication, a four-way handshake (to ensure that the client can generate cryptographic keys and to generate and install keys for both encryption and integrity on both ends), and an optional group key handshake (for multicast communication.)

Download 0,82 Mb.

Do'stlaringiz bilan baham:
1   ...   15   16   17   18   19   20   21   22   23




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish