SlideShare a Scribd company logo
COEN 350
Mobile Security
Wireless Security
 Wireless offers additional challenges:
 Physical media can easily be sniffed.
 War Driving

Legal?
 U.S. federal computer crime statute, Title 18 U.S.C. 1030,

Crime to knowingly access a computer used in interstate or
foreign communication "without authorization" and obtain any
information from the computer.

Crime to access a computer without authorization with "intent
to defraud" to obtain "anything of value."

But not if "the object of the fraud and the thing obtained
consists only of the use of the computer and the value of
such use is not more than $ 5,000 in any 1-year period."
Wireless Security
 Wireless offers additional challenges:
 Physical media can easily be sniffed.
 Mobile computing needs to preserve
battery power.

Calculations cost more on a mobile platform.

Especially important for sensor networks
Wireless Security:
Attackers Perspective
 Knowing the Threat
 Targets of opportunity

Goal is
 Internet access.
 Easy pickings.
 Targeted attacks

Targets assets valuable enough.
 Internal attackers

Most Dangerous

Can open an unintentional security hole
COEN 351 E-Commerce
Security
 E-Commerce Security Course Homepage
 Lecture Notes
IEEE 802.11
 Wired Equivalent Privacy (WEP)
Protocol
 Based on a shared secret k.

Distributed out of band.
 Uses CRC for internal integrity protection.
 Uses RC4 to encrypt network traffic.
WEP Protocol
WEP Protocol
 Confidentiality
 Original packet is first check-summed.
 Checksum and data form the payload.
 Transmitting device creates a 24-bit
random initialization vector IV.
 IV and shared key are used to encrypt with
RC4
WEP Protocol
 RC4
 Generates a pseudo-random stream of
bytes (keystream)

Based on a secret internal state
 Permutation S of all 256 possible bytes
 Two index pointers
 Plaintext is XORed with keystream
WEP Protocol
 RC4
 Key Scheduling Algorithm (KSA)

Initializes S based on a key
for i from 0 to 255
S[i] := i
j := 0
for i from 0 to 255
j := (j + S[i] + key[i mod keylength]) mod 256
swap(S[i],S[j])
WEP Protocol
 RC4
 Pseudo-Random Generation Algorithm
(PRGA)

Generates pseudo-random byte stream
i := 0
j := 0
while GeneratingOutput:
i := (i + 1) mod 256
j := (j + S[i]) mod 256
swap(S[i],S[j])
output S[(S[i] + S[j]) mod 256]
WEP Protocol
 RC4
 Known weaknesses

Keystream slightly biased
 Fluhrer & McGrew attack can distinguish keystream
from random stream given a GB of input.
 Fluhrer, Mantin, Shamir: statistics for output of the
first few bytes of output keystream are non-random,
leaking information about key.
WEP Protocol
 Authentication
 Station associating with access point
needs to authenticate itself.
 Both exchange the type of authentication
that is accepted.

Open: Just identification between station and
AP

Shared Secret: Participants send nonces to
each other, encrypt the nonce using WEP (and
the shared secret key), and verify the other’s
response.
WEP has no key management
 Everyone allowed to have access to a
wireless network has the same key.
 Anyone with the key can read ALL
traffic.
WEP: RC4
 RC4 uses the key and the IV to produce
a stream of pseudo-random bytes.
 Calculates cipher text from plaintext by
XORing the pseudo-random stream
with the plain-text.
WEP: RC4
WEP: Attacks on RC4
 Dictionary Attack

Build database:

224
different IVs

Build a database of 224
streams of MTU bytes
(2,312 B) for each different IV.

Takes < 40 GB storage.
 XOR two entries with the same IV.

Result are the two plaintexts XORed.

Natural language text has enough redundancy
to decrypt the XOR of two text streams.
WEP: Attacks on RC4
 Dictionary Attack
 Many packages can be completely or
partially guessed.
 XORing guessed plaintext and captured
cipher gives pseudo-random byte stream
for a given IV.
 Some implementations reset IVs poorly.
 This simplifies dictionary attacks.
WEP: Attacks on RC4
 Injection Attack
 Attacker creates packets on the wireless
connection.
 Attacker XORs plaintext and cipher.

Builds Pseudo-Random Stream database
indexed by IV.
RC4
Fluhrer, Mantin, Shamir Attack
 First few bits of several thousand
messages reveals key.
 Based on an analysis of the RC4 code.

Originally kept secret, but later leaked on the
internet.
RC4
Fluhrer, Mantin, Shamir Attack
 Key Scheduling Algorithm
 Sets up RC4 state array S
 S is a permutation of 0, 1, … 255
 Output generator uses S to create a
pseudo-random sequence.
 First byte of output is given by
S[S[1]+S[S[1]]].

First byte depends on
 {S[1], S[S[1], S[S[1]+S[S[1]]}
RC4
Fluhrer, Mantin, Shamir Attack
 Key Scheduling Algorithm
 First byte of plain text package is part of the SNAP header

0xAA for IP and ARP packages

0xFF or 0xE0 for IPX

Guessing the first byte is trivial
 Some IVs are vulnerable: “resolved”

(KeyByte+3, 0xFF, *)

Plus some more
 Easy to test whether an IV is vulnerable.
 Search for vulnerable IVs.
 They leak key bytes probabilistically.
 Large number of packets does it.
RC4
Fluhrer, Mantin, Shamir Attack
 Optimization needs about 5,000,000 to
1,000,000 packages.
 Counter-measures:
 Change key frequently.
 Change IV counters to avoid bad IVs.
WEP Message Modification
 WEP uses CRC code to ascertain integrity of
messages.
 CRC code is linear:
 CRC(x ⊕ y) = CRC(x) ⊕ CRC(y).
 Attacker knows plaintext M and desired modification
∆ for target plaintext M’ = M ⊕ ∆.
 Attacker want to substitute X = P⊕(M,CRC(M)) for
P⊕(M’,CRC(M’)).
 Attacker sends
X⊕(∆,CRC(∆)) = P⊕(M,CRC(M)) ⊕(∆,CRC(∆))
= P⊕(M’,CRC(M’))
Wireless Insecurity Problems
 WiFi card software allows users to
change the MAC address.
Wireless Security
 Casual user, low yield traffic
 WEP is good enough.
 Enterprise, Commercial
 Combine WEP with higher order security

SSH

VPN

IPSec
WPA
 Created by WiFi Alliance
 Certification started April 2003
 Uses 802.1X authentication server

Distributed different keys to each user.
 Can also be used in “pre-shared key”
(PSK) mode

Every user uses the same passphrase.

Called WPA Personal
IEEE 802.1X
http://www.linux.com/howtos/8021X-HOWTO/index.shtml
 Standard for port-
based authentication.
 Uses a third-party
authentication server
such as Radius
WPA
 Protocol changes over WEP
 CRC is replaced by “Michael” MIC.

MIC now includes a frame counter, preventing replay
attacks.

Payload bit flipping is now impossible.
 Data encryption still uses RC4, but now

Prevents key recovery attacks on WEP by using
 128b Key
 48b Initialization vector
 Temporal Key Integrity Protocol (TKIP) changes key
dynamically.
TKIP
 Temporal Key Integrity Protocol
 Ensures that every data packet has its own
encryption key.
802.11i
 Uses AES instead of RC4.
 Subset published as WPA2
 Uses 802.1X authentication
Protocol Layers
 WEP
 Privacy only.
 Very elementary security.
 WPA
 Temporal Key Exchange Protocol

Fixes WEP that scrambles keys between packages and adds a secure
message check.
 AES: Advanced Encryption Standard
 802.11i
 Military grade encryption, replaces DES
 802.1X
 General purpose and extensible framework for authentication users
and generating / distributing keys.
 Simple Secure Network (SSN)
 Recipe for authentication based on 802.1X
COEN 351 E-Commerce
Security
 E-Commerce Security Course Homepage
 Lecture Notes

More Related Content

PPT
Authentication in wireless - Security in Wireless Protocols
PPT
Firewall - Network Defense in Depth Firewalls
PPT
12 tcp-dns
PPTX
Ip Spoofing
PPTX
Pgp pretty good privacy
PPTX
ip security
PPT
IP Security in Network Security NS6
PDF
Practical Verification of TKIP Vulnerabilities
Authentication in wireless - Security in Wireless Protocols
Firewall - Network Defense in Depth Firewalls
12 tcp-dns
Ip Spoofing
Pgp pretty good privacy
ip security
IP Security in Network Security NS6
Practical Verification of TKIP Vulnerabilities

What's hot (20)

PPT
Barriers to TOR Research at UC Berkeley
PPT
PDF
CMIT 321 QUIZ 1
PPT
DOCX
Certified Ethical Hacker quick test prep cheat sheet
PPT
Ip sec and ssl
DOCX
Type of DDoS attacks with hping3 example
PPT
Firewalls
PPT
T C P I P Weaknesses And Solutions
PPTX
IPSec and VPN
PPT
Hacking Cisco
PPTX
IP Spoofing
PPTX
My ppt..priya
PPT
PPT
Ip sec talk
PPTX
Session hijacking
PDF
Informal Presentation on WPA-TKIP
PPT
Ipspoofing
PPTX
security problems in the tcp/ip protocol suite
Barriers to TOR Research at UC Berkeley
CMIT 321 QUIZ 1
Certified Ethical Hacker quick test prep cheat sheet
Ip sec and ssl
Type of DDoS attacks with hping3 example
Firewalls
T C P I P Weaknesses And Solutions
IPSec and VPN
Hacking Cisco
IP Spoofing
My ppt..priya
Ip sec talk
Session hijacking
Informal Presentation on WPA-TKIP
Ipspoofing
security problems in the tcp/ip protocol suite

Viewers also liked (18)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hacking web applications
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
PPTX
Lecture 07 - Executive Information Systems and the Data Warehouse
PPT
HBase In Action - Chapter 10 - Operations
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPT
Session 1 Tp1
PPT
COM Introduction
PPTX
enterprise java bean
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPT
Hibernate Tutorial
PDF
JPA and Hibernate
PPT
Introduction to hibernate
PPT
Intro To Hibernate
KEY
Hibernate performance tuning
DOC
Hibernate tutorial for beginners
Learning spark ch01 - Introduction to Data Analysis with Spark
Hacking web applications
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web
Lecture 07 - Executive Information Systems and the Data Warehouse
HBase In Action - Chapter 10 - Operations
Learning spark ch10 - Spark Streaming
Learning spark ch05 - Loading and Saving Your Data
Session 1 Tp1
COM Introduction
enterprise java bean
Learning spark ch04 - Working with Key/Value Pairs
Hibernate Tutorial
JPA and Hibernate
Introduction to hibernate
Intro To Hibernate
Hibernate performance tuning
Hibernate tutorial for beginners

Similar to Mobile Security - Wireless hacking (20)

PPT
Wireless security837
PPT
4 wifi security
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPT
Wireless Security (1).ppt
PPT
5169 wireless network_security_amine_k
PDF
WIRELESS SECURITY course in bachelor of engineering.pdf
PPTX
Wireless security
PPT
Shashank wireless lans security
PPT
Wireless hacking and security
PPT
Wireless Security.ppt
PPT
Wireless Security.ppt
PPTX
lm_wireless_security_overview_of_wireless_sec.pptx
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PDF
Wi-Fi security – WEP, WPA and WPA2
PPT
Wireless security presentation
PPT
chapter 8.ppt
PDF
Viable means using which Wireless Network Security can be Jeopardized
PPTX
Wireless lan security(10.8)
PPTX
Wireless Attacks
PPTX
WEP/WPA attacks
Wireless security837
4 wifi security
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
Wireless Security (1).ppt
5169 wireless network_security_amine_k
WIRELESS SECURITY course in bachelor of engineering.pdf
Wireless security
Shashank wireless lans security
Wireless hacking and security
Wireless Security.ppt
Wireless Security.ppt
lm_wireless_security_overview_of_wireless_sec.pptx
Wireless and WLAN Secuirty, Presented by Vijay
Wi-Fi security – WEP, WPA and WPA2
Wireless security presentation
chapter 8.ppt
Viable means using which Wireless Network Security can be Jeopardized
Wireless lan security(10.8)
Wireless Attacks
WEP/WPA attacks

More from phanleson (20)

PPT
E-Commerce Security - Application attacks - Server Attacks
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 2 - Using XML for Many Purposes
PPTX
SOA Course - SOA governance - Lecture 19
PPTX
Lecture 18 - Model-Driven Service Development
PPTX
Lecture 15 - Technical Details
PPTX
Lecture 10 - Message Exchange Patterns
PPTX
Lecture 9 - SOA in Context
PPTX
Lecture 07 - Business Process Management
PPTX
Lecture 04 - Loose Coupling
PPTX
Lecture 2 - SOA
PPTX
Lecture 3 - Services
PPTX
Lecture 01 - Motivation
E-Commerce Security - Application attacks - Server Attacks
HBase In Action - Chapter 04: HBase table design
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 2 - Using XML for Many Purposes
SOA Course - SOA governance - Lecture 19
Lecture 18 - Model-Driven Service Development
Lecture 15 - Technical Details
Lecture 10 - Message Exchange Patterns
Lecture 9 - SOA in Context
Lecture 07 - Business Process Management
Lecture 04 - Loose Coupling
Lecture 2 - SOA
Lecture 3 - Services
Lecture 01 - Motivation

Recently uploaded (20)

PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
English Language Teaching from Post-.pdf
PDF
Sunset Boulevard Student Revision Booklet
PPTX
How to Manage Starshipit in Odoo 18 - Odoo Slides
PPTX
Revamp in MTO Odoo 18 Inventory - Odoo Slides
PDF
Landforms and landscapes data surprise preview
PDF
Module 3: Health Systems Tutorial Slides S2 2025
PPTX
Software Engineering BSC DS UNIT 1 .pptx
PPTX
ACUTE NASOPHARYNGITIS. pptx
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
How to Manage Loyalty Points in Odoo 18 Sales
PDF
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
vedic maths in python:unleasing ancient wisdom with modern code
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PPTX
How to Manage Bill Control Policy in Odoo 18
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
The Final Stretch: How to Release a Game and Not Die in the Process.
English Language Teaching from Post-.pdf
Sunset Boulevard Student Revision Booklet
How to Manage Starshipit in Odoo 18 - Odoo Slides
Revamp in MTO Odoo 18 Inventory - Odoo Slides
Landforms and landscapes data surprise preview
Module 3: Health Systems Tutorial Slides S2 2025
Software Engineering BSC DS UNIT 1 .pptx
ACUTE NASOPHARYNGITIS. pptx
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
How to Manage Loyalty Points in Odoo 18 Sales
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
Open Quiz Monsoon Mind Game Prelims.pptx
Cardiovascular Pharmacology for pharmacy students.pptx
vedic maths in python:unleasing ancient wisdom with modern code
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
How to Manage Bill Control Policy in Odoo 18
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...

Mobile Security - Wireless hacking

  • 2. Wireless Security  Wireless offers additional challenges:  Physical media can easily be sniffed.  War Driving  Legal?  U.S. federal computer crime statute, Title 18 U.S.C. 1030,  Crime to knowingly access a computer used in interstate or foreign communication "without authorization" and obtain any information from the computer.  Crime to access a computer without authorization with "intent to defraud" to obtain "anything of value."  But not if "the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $ 5,000 in any 1-year period."
  • 3. Wireless Security  Wireless offers additional challenges:  Physical media can easily be sniffed.  Mobile computing needs to preserve battery power.  Calculations cost more on a mobile platform.  Especially important for sensor networks
  • 4. Wireless Security: Attackers Perspective  Knowing the Threat  Targets of opportunity  Goal is  Internet access.  Easy pickings.  Targeted attacks  Targets assets valuable enough.  Internal attackers  Most Dangerous  Can open an unintentional security hole
  • 5. COEN 351 E-Commerce Security  E-Commerce Security Course Homepage  Lecture Notes
  • 6. IEEE 802.11  Wired Equivalent Privacy (WEP) Protocol  Based on a shared secret k.  Distributed out of band.  Uses CRC for internal integrity protection.  Uses RC4 to encrypt network traffic.
  • 8. WEP Protocol  Confidentiality  Original packet is first check-summed.  Checksum and data form the payload.  Transmitting device creates a 24-bit random initialization vector IV.  IV and shared key are used to encrypt with RC4
  • 9. WEP Protocol  RC4  Generates a pseudo-random stream of bytes (keystream)  Based on a secret internal state  Permutation S of all 256 possible bytes  Two index pointers  Plaintext is XORed with keystream
  • 10. WEP Protocol  RC4  Key Scheduling Algorithm (KSA)  Initializes S based on a key for i from 0 to 255 S[i] := i j := 0 for i from 0 to 255 j := (j + S[i] + key[i mod keylength]) mod 256 swap(S[i],S[j])
  • 11. WEP Protocol  RC4  Pseudo-Random Generation Algorithm (PRGA)  Generates pseudo-random byte stream i := 0 j := 0 while GeneratingOutput: i := (i + 1) mod 256 j := (j + S[i]) mod 256 swap(S[i],S[j]) output S[(S[i] + S[j]) mod 256]
  • 12. WEP Protocol  RC4  Known weaknesses  Keystream slightly biased  Fluhrer & McGrew attack can distinguish keystream from random stream given a GB of input.  Fluhrer, Mantin, Shamir: statistics for output of the first few bytes of output keystream are non-random, leaking information about key.
  • 13. WEP Protocol  Authentication  Station associating with access point needs to authenticate itself.  Both exchange the type of authentication that is accepted.  Open: Just identification between station and AP  Shared Secret: Participants send nonces to each other, encrypt the nonce using WEP (and the shared secret key), and verify the other’s response.
  • 14. WEP has no key management  Everyone allowed to have access to a wireless network has the same key.  Anyone with the key can read ALL traffic.
  • 15. WEP: RC4  RC4 uses the key and the IV to produce a stream of pseudo-random bytes.  Calculates cipher text from plaintext by XORing the pseudo-random stream with the plain-text.
  • 17. WEP: Attacks on RC4  Dictionary Attack  Build database:  224 different IVs  Build a database of 224 streams of MTU bytes (2,312 B) for each different IV.  Takes < 40 GB storage.  XOR two entries with the same IV.  Result are the two plaintexts XORed.  Natural language text has enough redundancy to decrypt the XOR of two text streams.
  • 18. WEP: Attacks on RC4  Dictionary Attack  Many packages can be completely or partially guessed.  XORing guessed plaintext and captured cipher gives pseudo-random byte stream for a given IV.  Some implementations reset IVs poorly.  This simplifies dictionary attacks.
  • 19. WEP: Attacks on RC4  Injection Attack  Attacker creates packets on the wireless connection.  Attacker XORs plaintext and cipher.  Builds Pseudo-Random Stream database indexed by IV.
  • 20. RC4 Fluhrer, Mantin, Shamir Attack  First few bits of several thousand messages reveals key.  Based on an analysis of the RC4 code.  Originally kept secret, but later leaked on the internet.
  • 21. RC4 Fluhrer, Mantin, Shamir Attack  Key Scheduling Algorithm  Sets up RC4 state array S  S is a permutation of 0, 1, … 255  Output generator uses S to create a pseudo-random sequence.  First byte of output is given by S[S[1]+S[S[1]]].  First byte depends on  {S[1], S[S[1], S[S[1]+S[S[1]]}
  • 22. RC4 Fluhrer, Mantin, Shamir Attack  Key Scheduling Algorithm  First byte of plain text package is part of the SNAP header  0xAA for IP and ARP packages  0xFF or 0xE0 for IPX  Guessing the first byte is trivial  Some IVs are vulnerable: “resolved”  (KeyByte+3, 0xFF, *)  Plus some more  Easy to test whether an IV is vulnerable.  Search for vulnerable IVs.  They leak key bytes probabilistically.  Large number of packets does it.
  • 23. RC4 Fluhrer, Mantin, Shamir Attack  Optimization needs about 5,000,000 to 1,000,000 packages.  Counter-measures:  Change key frequently.  Change IV counters to avoid bad IVs.
  • 24. WEP Message Modification  WEP uses CRC code to ascertain integrity of messages.  CRC code is linear:  CRC(x ⊕ y) = CRC(x) ⊕ CRC(y).  Attacker knows plaintext M and desired modification ∆ for target plaintext M’ = M ⊕ ∆.  Attacker want to substitute X = P⊕(M,CRC(M)) for P⊕(M’,CRC(M’)).  Attacker sends X⊕(∆,CRC(∆)) = P⊕(M,CRC(M)) ⊕(∆,CRC(∆)) = P⊕(M’,CRC(M’))
  • 25. Wireless Insecurity Problems  WiFi card software allows users to change the MAC address.
  • 26. Wireless Security  Casual user, low yield traffic  WEP is good enough.  Enterprise, Commercial  Combine WEP with higher order security  SSH  VPN  IPSec
  • 27. WPA  Created by WiFi Alliance  Certification started April 2003  Uses 802.1X authentication server  Distributed different keys to each user.  Can also be used in “pre-shared key” (PSK) mode  Every user uses the same passphrase.  Called WPA Personal
  • 28. IEEE 802.1X http://www.linux.com/howtos/8021X-HOWTO/index.shtml  Standard for port- based authentication.  Uses a third-party authentication server such as Radius
  • 29. WPA  Protocol changes over WEP  CRC is replaced by “Michael” MIC.  MIC now includes a frame counter, preventing replay attacks.  Payload bit flipping is now impossible.  Data encryption still uses RC4, but now  Prevents key recovery attacks on WEP by using  128b Key  48b Initialization vector  Temporal Key Integrity Protocol (TKIP) changes key dynamically.
  • 30. TKIP  Temporal Key Integrity Protocol  Ensures that every data packet has its own encryption key.
  • 31. 802.11i  Uses AES instead of RC4.  Subset published as WPA2  Uses 802.1X authentication
  • 32. Protocol Layers  WEP  Privacy only.  Very elementary security.  WPA  Temporal Key Exchange Protocol  Fixes WEP that scrambles keys between packages and adds a secure message check.  AES: Advanced Encryption Standard  802.11i  Military grade encryption, replaces DES  802.1X  General purpose and extensible framework for authentication users and generating / distributing keys.  Simple Secure Network (SSN)  Recipe for authentication based on 802.1X
  • 33. COEN 351 E-Commerce Security  E-Commerce Security Course Homepage  Lecture Notes

Editor's Notes

  • #6: Course Homepage : http://ouo.io/SI9jJ Lecture Notes : http://ouo.io/0oFRv
  • #34: Course Homepage : http://ouo.io/SI9jJ Lecture Notes : http://ouo.io/0oFRv