neeraj_WirelessSec

neeraj_WirelessSec - Wireless Security By Neeraj Poddar...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Wireless Security By Neeraj Poddar Advanced Cryptography  04/14/2011 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The IEEE 802.11 wireless LAN standard was established in 1989  and was originally intended to seek a wireless equivalent to  Ethernet. Wide spread popularity in recent years.  Major difference between wired and wireless networks is access to  the transmitted data.  From the initial development stages of wireless technologies experts  knew that security would be a major issue that needed to be solved  in order for this technology to be able to overtake the place of wired  networks. 2 A Little Background 
Background image of page 2
Wireless security is a major demand in the secure  data   transferring services.  Accidental association Malicious association Non-traditional networks Identity theft (MAC spoofing) Man-in-the-middle attacks Denial of service Network injection 3 Security Concerns
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In WLANs, privacy is achieved by data contents protection with  encryption. There have been three major generations of security approaches,  which is mentioned below: • WEP (Wired Equivalent Privacy) • WPA (Wi-Fi Protected Access) • WPA2/802.11i (Wi-Fa Protection Access, Version 2) Each of these protocols has two generations named as personal  and enterprise. 4 Security Measures
Background image of page 4
5 OSI Model View
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WEP’s security goals are :- Access control : protecting the wireless network from  unauthorized access. Confidentiality:  to prevent eavesdropping. Data integrity:  to prevent tampering with transmitted  messages. 6 WEP 
Background image of page 6
 WEP uses RC4 algorithm for encryption and key stream  generation.  Sender side: The secret key used in WEP algorithm is 40-bit long is  concatenated with a 24-bit Initialization Vector (IV) for acting  as the encryption/decryption key. The resulting key acts as the seed for a Pseudo-Random  Number Generator (PRNG). The plaintext input in a integrity algorithm and concatenate by  the plaintext again. 7 WEP Algorithm
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Contd. .
Background image of page 8
WEP uses five operations to decrypt the  received (IV + Cipher text). The Pre-Shared Key and IV  concatenated to make a secret key. The Cipher text and Secret Key go to in  CR4 algorithm and a plaintext come as a  result. 9 Recipient Side
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Contd. .
Background image of page 10
Random bits whose size depends on the encryption algorithm and  is normally as large as the block size of the cipher or as large as the  Secret key.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 41

neeraj_WirelessSec - Wireless Security By Neeraj Poddar...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online