1 FIVE STAGES OF I.

Size: px
Start display at page:

Download "1 FIVE STAGES OF I."

Transcription

1 1 1 FIVE STAGES OF I. Stage 1. AP and Security Capability Discovery This stage consists of messages numbered (1) to (3). The AP either periodically broadcasts its security capabilities, indicated by RSN IE (Robust Security Network Information Element), in a specific channel through the Beacon frame; or responds to a station s Probe Request through a Probe Response frame. A wireless station may discover available access points and corresponding security capabilities by either passively monitoring the Beacon frames or actively probing every channel. Stage Authentication and Association This stage consists of messages numbered (4) to (7). The station chooses one AP from the list of available APs, and tries to authenticate and associate with that AP. Note that Open System Authentication is included only for backward compatibility, and a station should indicate its security capabilities in the Association Request. After this stage, the station and the AP are in authenticated and associated state. However, the authentication achieved so far is weak, and will be supplemented by further steps. At the end of this stage, the 802.1X ports remain blocked and no data packets can be exchanged. Stage 3. EAP/802.1X/RADIUS Authentication This stage consists of messages numbered (8) to (14). The supplicant and the authentication server execute a mutual authentication protocol (de facto EAP-TLS [10]), with the authenticator acting as a relay. After this stage, the supplicant and the authentication server have authenticated each other and generated some common secret, called the Master Session Key (MSK). The supplicant uses the MSK to derive a Pairwise Master Key (PMK). The key material on the server side is securely transferred to the authenticator, indicated by message (13). This allows the authenticator to derive the same PMK. This stage might be skipped if the supplicant and the authenticator are configured using a static Pre-Shared Key (PSK) as the PMK, or when a cached PMK is used during a Re-association. Stage 4. 4-Way Handshake This stage consists of messages numbered (15) to (18). Regardless of whether the PMK is derived from Stage 3, configured using a PSK, or reused from a cached PMK, the 4-Way Handshake must be executed for a successful RSNA establishment. The supplicant and authenticator use this handshake to confirm the existence of the PMK, verify the selection of the cipher suite, and derive a fresh Pairwise Transient Key (PTK) for the following data session. Simultaneously, the authenticator might also distribute a Group Transient Key (GTK) in message (17). After this stage, a fresh PTK (and maybe GTK) is shared between the authenticator and the supplicant, and the 802.1X ports are unblocked for data packets. Stage 5. Group Key Handshake This stage consists of messages numbered (19) and (20). In case of multicast applications, the authenticator will generate a fresh GTK and distribute this GTK to the supplicants. These handshakes might not be present if the fresh GTK has been distributed in Stage 4. This stage may be repeated multiple STA t=t+1 3. Fast access authentication request (SNonce,User-ID,AS-ID, F, t) 5. Fast authentication response (SNonce, User-ID, AS-ID, E, t) AS 4. AS verifies t and F, then generates PMK Fig. 1. The interaction between the STA and AS. STA 8. Generates PMK and PTK,verifies MIC1 2. The first authentication message ( SNonce, User-ID) Authentication Request (open) 7. The second authentication message (ANonce, User-ID, MIC1) Authentication Response (open) 9. The third authentication message (SNonce, MIC2) Association Request 11. The fourth authentication message (MIC3) Association Response Fig. 2. The interaction between the STA and AP. AP 10. Verifies MIC2 times using the same PMK. Through these handshakes, the supplicant and the authenticator mutually authenticate each other and establish a secure session for data transmissions. 2 THE SECURITY ANALYSIS OF THE PRO- POSAL The proposed scheme first employs the shared key k to realize the mutual authentication between the STA and the AS, deriving the PMK. Then, using the PMK, the STA and the AP authenticate each other and generate the PTK. According to those two different functions, we divide the scheme into two parts which are the interaction between the STA and the AS, and the one between the STA and the AP. The former is shown in Figure 1 and the latter in Figure 2. In the two figures, the message fields that do not affect the security are omitted. From Figure 2, it can be seen that the message interactions are same as the 4-way handshake protocol. The only difference is that in the 4-way handshake protocol the STA and the AP already get the PMK before the protocol starts, while in our scheme the AP and the STA get the PMK through the message interactions shown in Figure 1, after the message (5) and (7) respectively. Therefore, only if the derived PMK in Figure 1 is secure, the protocol in Figure 2 is as secure as the 4- way handshake protocol. In the following, we will prove the security of the protocol in Figure 1 with the Canetti-Krawczyk (CK) model [12] which is a provably secure formal method for authentication and key agreement protocols.

2 2 Definition 1. Matching session: A key agreement protocol runs in a network where multiple users interconnect each other. And each entity runs an instance of the protocol which we call a session. A session can be expressed as a quaternion (A,B,X,Y) where A is the owner of the session, B is the correspondent of A, X is the messages sent and Y is the received message. The session (B,A,X,Y) is the matching session of (A,B,X,Y). The protocol attacker can choose, at any time during its run, a test-session among the sessions that are completed, unexpired and unexposed at the time. And the attacker is not allowed to expose the test-session or its matching session. Definition 2. Session-key security: A key agreement protocol is called Session-Key security (or SK-security) if the following properties hold for any attacker. (1) If two uncorrupted parties complete matching sessions then they both output the same key; (2) The attacker cannot distinguish a session key from a random value with a non-negligible advantage. For more details about the CK model, [12] can be referred to. The authentication protocol in Figure 1 is denoted by π. To prove that it is SK-secure, we design a game which combines π and the security of the hash function f(). We will prove that if π is not SK-secure, the attacker can take use of the capacity he gets from the protocol attack to win the game, then the hash function f() is broken. The participators of the game are G and B. G is of the Random Oracle function, and B is the attacker of the protocol π which takes use of the capacity he gets from the protocol attack to take part in the game. G knows the shared key k between STA and AS, while B does not know. The game is as follows. Phase 1: B challenges G with t 2 and Nonce 2. G chooses a bit b {0,1}. R If b=0, then G replies with f(k,t 2 Nonce 2 User-ID AS-ID). If b=1, G replies with a random value s which has the same length as f(k,t 2 Nonce 2 User-ID AS-ID). Phase 2: B queries G with arbitrary integrity t and random number Nonce, and G responds with F= f(k,t Nonce User-ID AS-ID). B can repeat this process multiple times, and t and Nonce are chosen adaptively by B. (i.e., according to the reply of G for the previous t and Nonce, B chooses the next t and Nonce.) Phase 3: After a number of queries, B outputs a bit b as the guess of b. If and only if b=b, B wins the game. In the above game, in Phase 2 B can query G with arbitrary t and Nonce, but he cannot use both t 2 and Nonce 2 at the same time. To reduce the difficulty, B can fix Nonce and always sets Nonce as Nonce 2. According to Definition 1, to prove that π is SK-secure we need to demonstrate that it satisfies two conditions. First, if the STA and the AS complete matching sessions, they will get a same session key. Second, the attacker cannot distinguish the session key PMK from a random value with a non-negligible advantage. In the following, we will prove that π satisfies the two conditions. Lemma 1: If the STA and the AS complete matching sessions, they will get a same session key. Proof: If the STA and AS complete matching sessions, they will get the same parameter t and derive a same key PMK= h(k, FIA PMK t User-ID AS-ID). Therefore, the first condition holds. Lemma 2: If the hash function f() and h() is secure, then when the protocol π completes, the attacker cannot distinguish the session key PMK from a random value with a non-negligible advantage. Proof: There are two methods that the attacker can get the session key with a non-negligible probability. One is to disable the STA and AS to complete matching sessions, and the other one is to attack the key derivation function h(). For the first method, the attacker can disable the STA and the AS to complete matching sessions only if he can forge an authentication request or an authentication response. First, it is assumed that the attacker fakes a fast authentication request message where the t is fresh (i.e., the t is bigger than any t that the STA ever used). Then he can run another station STA to send this message to AS. AS verifies the message and replies the fast authentication reply. Then the session in the STA is (STA,AS,X,Y) where X is the sent message and Y is the received message, while the session in the AS is (AS,STA,Y,X) because the AS thinks that he is communicating with the STA. Thus, the STA and AS do not hold matching sessions. Then, the attacker chooses the session in the STA as the test session (it should be noticed that this session is eligible for the test session, because it is completed, unexpired and unexposed), and then exposes the session (AS,STA,Y,X). In such a way, the attacker can get the session key PMK. Next, we assume that the attacker fakes a fast authentication response. Then, when the STA sends a fast authentication request, the attacker intercepts this message and runs another station STA to reply the faked message to the STA. So, the session in the STA is (STA,AS,X,Y), while the session in STA is (STA,STA,Y,X). They are not matching sessions. Then, the attacker chooses the session in the STA as the test session, and exposes the session (STA,AS,X,Y) and gets the PMK. In the following, we will prove that those two counterfeiting are infeasible using the reduction to absurdity. 1) It is assumed that with a non-negligible probability the attacker can fake a fast authentication request message {User- ID, AS-ID, F, t } (t is bigger than any t that STA ever sent, and F =f(k, t SNonce User-ID AS-ID), then the attacker can take use of this capacity to take part in the game designed. Specifically, in phase 1 t 2 is set as t and Nonce 2 is set as SNonce, then in the phase 3, the attacker B can easily figure out the value G replies is f(k, t 2 Nonce 2 User-ID AS-ID) or s, because the attacker can get the F =f(k, t SNonce User-

3 3 ID AS-ID) with a non-negligible probability. In such a way, the attacker wins the game. That is, after some rounds of training (phase 2), with a non-negligible advantage the attacker can distinguish the hash value of a fresh message from a random value without knowing the key k. (It should be noted that the hash value is fresh because in the phase 2 B cannot query G using t. Additionally, t is bigger than any t the STA ever used, therefore, the protocol attacker does not get the hash value corresponding to t. Only through the training can B get this capacity.) Then f() is broken, which conflicts with our assumption. Consequently, the attacker can not fake a fast authentication request with a non-negligible probability. 2) It is assumed that the attacker fakes a fast authentication response {User-ID, AS-ID, E*, t*} where E*=f(k, t* Nonce AS-ID User-ID) and t*=t+1 (t is the count value in the fast authentication request). To prove that this fake is impossible to succeed, we need to modify the game. In the phase 1, if b=0, G replies B with f(k,t 2 Nonce 2 AS-ID User-ID). In the phase 2, G replies with f(k,t Nonce AS-ID User-ID). It is assumed that with a non-negligible probability the attacker can fake a fast authentication response {User-ID, AS- ID, E*, t*} (t*=t+1), then the attacker can take use of this capacity to take part in the game. (Notice: the attacker cannot forward the fast authentication request from the STA to the AS, and get E* from the AS s reply. Because if so, rather than behave as a faker, the attacker just acts as a router between the STA and AS). Specifically, in phase 1 t 2 is set as t* and Nonce 2 is set as SNonce, then in the phase 3, the attacker B can easily tell the value G replies is f(k, t 2 Nonce 2 AS-ID User- ID) or s, because the attacker gets the E*=f(k, t* SNonce AS- ID User-ID) with a non-negligible probability. That is, after some rounds of training (phase 2), the attacker can distinguish the hash value of a message from a random value without knowing the key k. Then the f() is insecure, which conflicts the assumption. Therefore, the attacker cannot fake a fast authentication response with a non-negligible probability. From the above analysis, it can be seen that the attacker cannot fake a fast authentication request or a fast authentication response. Then, the only way he can take is to directly attack the key derivation function h(). According to the assumption, h() is secure, which means that without k, nobody can distinguish a keyed hash value (i.e., PMK) from a random value of same bit length with a non-negligible advantage. Otherwise, the h() is not secure. Therefore, this method does not work either. In summary, when the protocol π completes, the attacker cannot distinguish the session key PMK from a random value with a non-negligible advantage. According to Lemma 1 and Lemma 2, the following theorem can be achieved. Theorem 1: If the hash function f() and h() is secure, π is SK-secure, and the STA and the AP can securely get the session key PMK. It should be noticed that in some circumstances, the STA cannot complete the protocol π implementation, which are given as follows. (1) Because of the networks congestion, when the fast authentication response message reaches the STA, it has already aborted. (2) The attacker intercepts and holds the fast authentication response message (or the fast authentication request message) and sends it to the STA (or the AS) until the STA aborts. This kind of attack is called forced delay in [13], and we can take the attacker as a malicious router. The above circumstances will result that the STA thinks the authentication fails while the AS thinks it succeeds, which is an unexpected outcome. The new scheme takes into account of those circumstances, because in those circumstances the STA can not proceed the protocol (i.e., send the third message) any longer, then the AP will not receive the expected third authentication message in a given time or receive one with an incorrect MIC 2 (the attacker fakes a MIC 2 to impersonate the legal STA). Then the AP will inform the AS that the STA s authentication fails which will in turn delete the derived PMK and set the STA s state as unauthenticated. In such a way, for our whole scheme (shown in Figure 2), its possible outcome is: 1) the STA and the AS both complete the protocol and get the PMK securely, or, 2) they both think the protocol fails. And the inconsistency regarding the authentication result will not occur. Upon completing the protocol π, the AS delivers the PMK to the AP through the secure channel, and then the STA and the AP will securely share the PMK. So far, the security of the whole scheme rests on the protocol in Figure 2, which is essentially same as the 4-way handshake. Therefore, our scheme FLAP is at least as secure as the 4-way handshake. Furthermore, FLAP can overcome the DoS attack in the 4-way handshake that has pointed out in [14]. The reason resulting in the DoS attack is that the first message is an unprotected plaintext message. An attacker can impersonate the AP to generate a large quantity of such messages for the STA, and the STA cannot determine which ANonce the AP adopted to generate the PTK until the third step, therefore, the STA has to store vast two-tuples {ANonce, PTK}, resulting in the memory exhausting. But in FLAP, the first message is protected under the F. After the AP receives this message, he does nothing except forwarding it to the AS. Until the AS verifies the fast authentication request, the AP will then accept the SNonce in the response, and then generate ANonce and computes the PTK. Besides, the attacker cannot forge the first authentication message (this has been proven in Lemma 2), therefore, in Step 6 the AP just needs to store a triple {ANonce, SNonce, PTK} for one STA. Consequently, our scheme can overcome the DoS attack in the 4-way handshake. Notice that in FLAP it is meaningful that the AP is required not to store the SNonce after it receives the first authentication message. Otherwise, the AP has to store all of SNonce, if the attacker simultaneously sends a mass of the first authentication messages to the AP even if those messages cannot pass the AS verification, which also will result in a memory exhausting DoS attack for the AP. To sum up the above arguments, we can get the Deduction 1 as follows. Deduction 1: If the hash function f() and h() is secure, our scheme FLAP can achieve mutual authentications among the STA, AP and AS, and generates a secure key

4 4 PTK. Furthermore, FLAP is more secure than the 4-way handshake protocol. 3 THE CONFIGURATION OF THE TESTBED (1) STA One HP desktop (2.26GHz Core 2 Duo CPU and 2G RAM) is adopted as the STA, and its operation system is Linux Fedora 14 which kernel version is The wireless PCI network card is TP-LINK TL WN550G 54M. The OpenSSL 1 is used for encryptions and decryptions whose version is openssl-1.0.0d. The wpa supplicant 2 is adopted as the STA simulator which version is wpa supplicant (2) AP One HP desktop (2.26GHz Core 2 Duo CPU and 2G RAM) acts as the AP, and its operation system is Linux Fedora 14 which kernel version is The wireless PCI networks card is TP-LINK TL WN550G 54M. The same OpenSSL is installed. The hostapd 3 is adopted as the AP simulator which version is hostapd (3) AS The AS runs on a HP desktop (3.0GHz Core 2 Duo CPU and 2G RAM) and its operation system is Ubuntu The freeradius 4 is adopted which version is freeradius-server , and the same OpenSSL is installed. 4 RELATED WORK Before the establishment of the ai task group, the fast initial access authentication was not the research focus, and most researchers devoted their energy to reducing the handoff latency between the WLAN APs, and a lot of schemes have been proposed. The common method that they utilize is that before the STA starts the handoff process, a pre-authentication is performed and related key materials are distributed to the candidate APs. Then when the handoff begins, instead contacting with the backed AS, the STA just needs to carry out a simple authentication with the AP directly, using the key materials derived in the pre-authentication. Thus, the authentication delay is reduced substantially. For example, [20] introduces the concept of FHR (frequent handoff region) which is a set of APs selected based on users mobility patterns and their service classes. The STA entering an area of an AP performs authentication procedures with the APs in the FHR instead of the current AP. Since the STA is authenticated for FHR in advance, the handoff latency due to the re-authentication can be minimized. [21] introduces a novel data structure, the Neighbor Graph, which dynamically captures the mobility topology of the networks. During the initial access authentication, the key materials are distributed to the candidate APs in the Neighbor Graph. In such a method, the communication between the AP and the authentication server can be waived and the handoff latency is reduced when the handoff starts. To reduce the authentication delay further, proactive key distribution with anticipated four-way handshake supplicant/ is introduced in [22]. After the AS extracts the neighbor APs list, it sends MAC addresses of neighboring APs to the STA. As a result, the STA can generate PTKs before the handoff to waive the four-way handshake. The scheme proposed in [23] is a little different from the pre-authentication methods mentioned above. The tunnel technique is introduced to reduce authentication latency. When the handoff targeted AP is decided, the current AP generates a pairwise tunnel key for the STA and the targeted AP. When the handoff to the targeted AP starts, only the open authentication is performed. After the new association is established, all the data sent to the new AP are encrypted by the tunnel key and are forwarded to the old AP which will send the packets to their destinations. Simultaneously, the STA performs the EAP authentication with the backend authentication server through the new AP. Upon the EAP authentication is finished, the temporal tunnel key is obsoleted, and the STA can communicate with the new access point as usual. With the soared popularity of WLAN, new scenarios appear and they demand a faster initial access authentication, and some schemes have been proposed. For example, a novel technique has been suggested in [24] to exchange a valid token during registration phase between the AS and the STA. This token will be used to generate a valid token key to encrypt all messages in the authentication phase. But this method employs even four roundtrip messages, which limits its efficiency. The ai does a lot of work and several schemes have been put forward regarding the fast access authentication. [25] proposed two optional protocols which just needs 1.5 roundtrip messages to complete the authentication. In the first one, the 4-way handshake is reduced to 3-way handshake which is used to realize the fast authentication, and the AP sends the random value ANonce in the network discovery phase. But if the passive scan is employed by the STA, then at a given time slot, all the STAs receiving the beacon will share a same ANonce. Furthermore, the valid period of the ANonce is also an issue. If it is set too short, the ANonce maybe has expired before an STA gets the channel. If too long, the replay attack is possible. Those factors have the potential to compromise the security of the protocol. In the second proposal, a full i authentication is needed before the fast authentication. Based on the keys from the full authentication the fast authentication is performed. A common shortcoming of these two proposals is that at the end of the protocols the AP does not get an explicit confirmation that whether its authentication is successful or not, which possibly results that the STA does not pass the AP s authentication while the AP thinks otherwise. In [26], authors think that users may have different delay tolerance levels for network association and greedy/immediate association only reduces the association efficiency but not guarantees fast link setup. Therefore, STAs are allowed to associate with an AP with different priorities, to ensure timecritical STAs to achieve a shorter delay in the fast initial link setup. But association priority assignment is open for further discussion, and details of the differentiated association scheme need further investigation. In [27], when the full i authentication completes, the

5 STA and the AP will cache the related context information (such as the PMK). When the time duration has not been expired and the STA attempts to be associated with the AP, the authentication can be performed directly between the AP and the STA without the involvement of the AS. In such a way, the authentication delay is reduced. Whereas, for some scenarios where an STA enters into a new WLAN or the context has expired, e.g., a lot of passengers get off the metro and try to establish the WLAN link, this proposal is not applicable. In [28], a trusted third party (TTP) is introduced which authenticates the Diffie-Hellman [29] exchange between STA and AP. It features perfect forward secrecy (PFS) and 2 roundtrip messages. But the Diffie-Hellman exchange is not suitable for resource constrained mobile devices and also its computation delay is obviously longer than the symmetric cryptographic operations. 5

An Efficient WLAN Initial Access Authentication Protocol

An Efficient WLAN Initial Access Authentication Protocol Globecom 2012 - Communication and nformation System Security Symposium An Efficient WLAN nitial Access Authentication Protocol Xinghua Li Jianfeng Ma Shen Yulong Xidian University, Xi'an, 710071, China

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

WPA-GPG: Wireless authentication using GPG Key

WPA-GPG: Wireless authentication using GPG Key Università degli Studi di Bologna DEIS WPA-GPG: Wireless authentication using GPG Key Gabriele Monti December 9, 2009 DEIS Technical Report no. DEIS-LIA-007-09 LIA Series no. 97 WPA-GPG: Wireless authentication

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018 Improved KRACK Attacks Against WPA2 Implementations Mathy Vanhoef @vanhoefm OPCDE, Dubai, 7 April 2018 Overview Key reinstalls in 4-way handshake New KRACKs Practical impact Lessons learned 2 Overview

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

WPA Passive Dictionary Attack Overview

WPA Passive Dictionary Attack Overview WPA Passive Dictionary Attack Overview TakehiroTakahashi This short paper presents an attack against the Pre-Shared Key version of the WPA encryption platform and argues the need for replacement. What

More information

Proofs for Key Establishment Protocols

Proofs for Key Establishment Protocols Information Security Institute Queensland University of Technology December 2007 Outline Key Establishment 1 Key Establishment 2 3 4 Purpose of key establishment Two or more networked parties wish to establish

More information

Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan*

Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan* Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan* Xinghua Li 1,2, Jianfeng Ma 1, and SangJae Moon 2 1 Key Laboratory of Computer Networks and Information

More information

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake Mathy Vanhoef - @vanhoefm imec-distrinet, KU Leuven Black Hat, 27 July 2017 Introduction More and more Wi-Fi network

More information

Fast and Secure Initial Access Authentication Protocol for Wireless LANs

Fast and Secure Initial Access Authentication Protocol for Wireless LANs American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-08, pp-284-294 www.ajer.org Research Paper Open Access Fast and Secure Initial Access Authentication

More information

Secure and Seamless Handoff Scheme for a Wireless LAN System

Secure and Seamless Handoff Scheme for a Wireless LAN System Secure and Seamless Handoff Scheme for a Wireless LAN System Jaesung Park 1,BeomjoonKim 2, and Iksoon Hwang 3 1 Department of Internet Information Engineering, The University of Suwon, Gyeonggi-Do, 445-743,

More information

A Wireless LAN Protocol for Initial Access Authentication

A Wireless LAN Protocol for Initial Access Authentication www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 9 September 2014 Page No. 7992-7999 A Wireless LAN Protocol for Initial Access Authentication Sandhya

More information

Security Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router

Security Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router Security Enhanced IEEE 802.1x Method for WLAN Mobile Router Keun Young Park*, Yong Soo Kim*, Juho Kim* * Department of Computer Science & Engineering, Sogang University, Seoul, Korea kypark@sogang.ac.kr,

More information

Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing

Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing Mathy Vanhoef, Domien Schepers, Frank Piessens imec-distrinet, KU Leuven Asia CCS 2017 Introduction More and more Wi-Fi

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Troubleshooting WLANs (Part 2)

Troubleshooting WLANs (Part 2) SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Nullcon, 2 March 2018 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that s secure? Seems so! No attacks

More information

A Secure Wireless LAN Access Technique for Home Network

A Secure Wireless LAN Access Technique for Home Network A Secure Wireless LAN Access Technique for Home Network *Ju-A Lee, *Jae-Hyun Kim, **Jun-Hee Park, and **Kyung-Duk Moon *School of Electrical and Computer Engineering Ajou University, Suwon, Korea {gaia,

More information

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018 KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned

More information

The security of existing wireless networks

The security of existing wireless networks Security and Cooperation in Wireless Networks Cellular networks o o GSM UMTS WiFi LANs Bluetooth Security in Wireless Networks Wireless networks are more vulnerable to security issues: Broadcast communications

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

Secure Initial Access Authentication in WLAN

Secure Initial Access Authentication in WLAN International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1299-1303 International Research Publications House http://www. irphouse.com Secure Initial

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Chaos Communication Congress (CCC), 27 December 2017 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Overview 1. Key reinstallation in 4-way handshake 2. Misconceptions and remarks

More information

1 Defining Message authentication

1 Defining Message authentication ISA 562: Information Security, Theory and Practice Lecture 3 1 Defining Message authentication 1.1 Defining MAC schemes In the last lecture we saw that, even if our data is encrypted, a clever adversary

More information

Experimenting with early opportunistic key agreement

Experimenting with early opportunistic key agreement septembre 2002 SÉcurité des Communications sur Internet SECI02 Experimenting with early opportunistic key agreement Catharina Candolin ½ & Janne Lundberg ½ & Pekka Nikander ¾ 1: Laboratory for Theoretical

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

WLAN Roaming and Fast-Secure Roaming on CUWN

WLAN Roaming and Fast-Secure Roaming on CUWN 802.11 WLAN Roaming and Fast-Secure Roaming on CUWN Contents Introduction Prerequisites Requirements Components Used Background Information Roaming with Higher-Level Security WPA/WPA2-PSK WPA/WPA2-EAP

More information

Selecting transition process for WLAN security

Selecting transition process for WLAN security WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2008; 8:921 925 Published online 17 August 2007 in Wiley InterScience (www.interscience.wiley.com).538 Selecting transition process

More information

Table of Contents 1 WLAN Security Configuration Commands 1-1

Table of Contents 1 WLAN Security Configuration Commands 1-1 Table of Contents 1 WLAN Security Configuration Commands 1-1 authentication-method 1-1 cipher-suite 1-2 gtk-rekey client-offline enable 1-2 gtk-rekey enable 1-3 gtk-rekey method 1-4 ptk-lifetime 1-5 security-ie

More information

Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing

Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing Tsai, Hong-Bin Chiu, Yun-Peng Lei, Chin-Laung Dept. of Electrical Engineering National Taiwan University July 10,

More information

Troubleshooting WLANs

Troubleshooting WLANs Troubleshooting WLANs Tips and tricks with practical examples!! by Gregor Vucajnk, Knowledge Services at Aerohive Networks email: gvucajnk(at)aerohive.com, twitter: @GregorVucajnk Get a free Aerohive AP/management

More information

CS 395T. Formal Model for Secure Key Exchange

CS 395T. Formal Model for Secure Key Exchange CS 395T Formal Model for Secure Key Exchange Main Idea: Compositionality Protocols don t run in a vacuum Security protocols are typically used as building blocks in a larger secure system For example,

More information

IEEE i and wireless security

IEEE i and wireless security Blog IEEE 802.11i and wireless security David Halasz 8/25/2004 10:00 PM EDT 0 comments post a comment Tweet Share 1 2 IEEE's wireless security amendment adds stronger encryption, authentication, and key

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Modeling and Verification of IEEE i Security Protocol for Internet of Things

Modeling and Verification of IEEE i Security Protocol for Internet of Things Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things Yuteng Lu and Meng Sun LMAM & Department of Informatics, School of Mathematical Sciences, Peking University, Beijing,

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Wireless KRACK attack client side workaround and detection

Wireless KRACK attack client side workaround and detection Wireless KRACK attack client side workaround and detection Contents Introduction Components used Requirements EAPoL Attack protections Why this works Possible impact How to identify if a client is deleted

More information

Applied Cryptography and Computer Security CSE 664 Spring 2017

Applied Cryptography and Computer Security CSE 664 Spring 2017 Applied Cryptography and Computer Security Lecture 18: Key Distribution and Agreement Department of Computer Science and Engineering University at Buffalo 1 Key Distribution Mechanisms Secret-key encryption

More information

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #5: Medium Access Control High Throughput, Security Tamer Nadeem Dept. of Computer Science High Throughput Networks (802.11n) Slides adapted from

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) HW/Lab 4: IPSec and Wireless Security CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) This HW/Lab assignment covers Lectures 8 (IPSec) and 10 (Wireless Security). Please review these

More information

05 - WLAN Encryption and Data Integrity Protocols

05 - WLAN Encryption and Data Integrity Protocols 05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks

More information

Ju-A A Lee and Jae-Hyun Kim

Ju-A A Lee and Jae-Hyun Kim Ju-A A Lee and Jae-Hyun Kim Wireless Information & Network Engineering Research Lab, Korea {gaia, jkim}@ajou.ac.kr Abstract. IEEE 802.11i standard supports a secure access control for wireless LAN and

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802. WEP Weakness Csci388 Wireless and Mobile Security Access Control:, EAP, and Xiuzhen Cheng cheng@gwu.edu 1. IV is too short and not protected from reuse 2. The per packet key is constructed from the IV,

More information

Network Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017

Network Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017 Network Security: WLAN Mobility Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017 Outline Link-layer mobility in WLAN Password-based authentication for WLAN Eduroam case study 2 LINK-LAYER

More information

FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING

FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING Maryna Komarova Michel Riguidel Artur Hecker ENST 46 rue Barrault, Paris 13, France ABSTRACT In this paper we introduce the Fast re-authentication

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011 Outline Introduction Shared-key Authentication Asymmetric authentication protocols

More information

Real-time protocol. Chapter 16: Real-Time Communication Security

Real-time protocol. Chapter 16: Real-Time Communication Security Chapter 16: Real-Time Communication Security Mohammad Almalag Dept. of Computer Science Old Dominion University Spring 2013 1 Real-time protocol Parties negotiate interactively (Mutual) Authentication

More information

T Cryptography and Data Security

T Cryptography and Data Security T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use

More information

CSC 5930/9010 Modern Cryptography: Public Key Cryptography

CSC 5930/9010 Modern Cryptography: Public Key Cryptography CSC 5930/9010 Modern Cryptography: Public Key Cryptography Professor Henry Carter Fall 2018 Recap Number theory provides useful tools for manipulating integers and primes modulo a large value Abstract

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

CS 494/594 Computer and Network Security

CS 494/594 Computer and Network Security CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Real-Time Communication Security Network layers

More information

Feedback Week 4 - Problem Set

Feedback Week 4 - Problem Set 4/26/13 Homework Feedback Introduction to Cryptography Feedback Week 4 - Problem Set You submitted this homework on Mon 17 Dec 2012 11:40 PM GMT +0000. You got a score of 10.00 out of 10.00. Question 1

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 37 Chapter 9: Symmetric Key Distribution To understand the problems associated with managing and distributing secret keys.

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Cryptographic Authentication Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2014 Network Security: WLAN Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2014 Outline Wireless LAN technology Threats against WLANs (Weak security mechanisms and historical WEP)

More information

Outline More Security Protocols CS 239 Computer Security February 4, 2004

Outline More Security Protocols CS 239 Computer Security February 4, 2004 Outline More Security Protocols CS 239 Computer Security February 4, 2004 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona

More information

Physical and Link Layer Attacks

Physical and Link Layer Attacks Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Key Management in Ad-Hoc Networks

Key Management in Ad-Hoc Networks Key Management in Ad-Hoc Networks Jukka Valkonen Helsinki University of Technology Laboratory for Theoretical Computes Science jukka.valkonen@tkk.fi Abstract. Key management is crucial part of security

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Offline dictionary attack on TCG TPM weak authorisation data, and solution

Offline dictionary attack on TCG TPM weak authorisation data, and solution Offline dictionary attack on TCG TPM weak authorisation data, and solution Liqun Chen HP Labs, UK Mark Ryan HP Labs, UK, and University of Birmingham Abstract The Trusted Platform Module (TPM) is a hardware

More information

1 Identification protocols

1 Identification protocols ISA 562: Information Security, Theory and Practice Lecture 4 1 Identification protocols Now that we know how to authenticate messages using MACs, a natural question is, how can we use MACs to prove that

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security Objectives: 1) Understanding the basic operations of WLANs 2) WLAN security 3) Wireless body area networks (IEEE 802.15.6) Readings: 1. Kurose & Ross, Computer Networking: A Top-Down Approach (6th Edition),

More information

Securing Wireless Communication Against Dictionary Attacks Without Using PKI

Securing Wireless Communication Against Dictionary Attacks Without Using PKI College of Technology College of Technology Masters Theses Purdue Libraries Year 2010 Securing Wireless Communication Against Dictionary Attacks Without Using PKI Sarath Geethakumar Purdue University -

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Cryptographic Authentication Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

A Limitation of BAN Logic Analysis on a Man-in-the-middle Attack

A Limitation of BAN Logic Analysis on a Man-in-the-middle Attack ISS 1746-7659, England, U Journal of Information and Computing Science Vol. 1, o. 3, 2006, pp. 131-138 Limitation of Logic nalysis on a Man-in-the-middle ttack + Shiping Yang, Xiang Li Computer Software

More information

Summary on Crypto Primitives and Protocols

Summary on Crypto Primitives and Protocols Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance

More information

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: WLAN Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline Wireless LAN technology Threats against WLANs Weak security mechanisms and historical WEP

More information

Link Security A Tutorial

Link Security A Tutorial Link Security A Tutorial Fortress Technologies, Inc. Slide 1 Five basic security services Data confidentiality Data integrity Access control and access rights Authentication/Roaming Non-repudiation These

More information

Security Analysis of Bluetooth v2.1 + EDR Pairing Authentication Protocol. John Jersin Jonathan Wheeler. CS259 Stanford University.

Security Analysis of Bluetooth v2.1 + EDR Pairing Authentication Protocol. John Jersin Jonathan Wheeler. CS259 Stanford University. Security Analysis of Bluetooth v2.1 + EDR Pairing Authentication Protocol John Jersin Jonathan Wheeler CS259 Stanford University March 20, 2008 Version 1 Security Analysis of Bluetooth v2.1 + EDR Pairing

More information

Robust EC-PAKA Protocol for Wireless Mobile Networks

Robust EC-PAKA Protocol for Wireless Mobile Networks International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks

More information

Security Considerations for Handover Schemes in Mobile WiMAX Networks

Security Considerations for Handover Schemes in Mobile WiMAX Networks Security Considerations for Handover Schemes in Mobile WiMAX Networks Junbeom Hur, Hyeongseop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song Division of Computer Science, Mobile Media Platform Center, Korea

More information

Homework 3: Solution

Homework 3: Solution Homework 3: Solution March 28, 2013 Thanks to Sachin Vasant and Xianrui Meng for contributing their solutions. Exercise 1 We construct an adversary A + that does the following to win the CPA game: 1. Select

More information

CIS 4360 Secure Computer Systems Applied Cryptography

CIS 4360 Secure Computer Systems Applied Cryptography CIS 4360 Secure Computer Systems Applied Cryptography Professor Qiang Zeng Spring 2017 Symmetric vs. Asymmetric Cryptography Symmetric cipher is much faster With asymmetric ciphers, you can post your Public

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Modelling the Security of Key Exchange

Modelling the Security of Key Exchange Modelling the Security of Key Exchange Colin Boyd including joint work with Janaka Alawatugoda, Juan Gonzalez Nieto Department of Telematics, NTNU Workshop on Tools and Techniques for Security Analysis

More information

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Outline More Security Protocols CS 239 Computer Security February 6, 2006 Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent

More information