Chapter 11 - 02 - Understand Wireless Network Encryption Mechanisms - 01_ocred.pdf

Full Transcript

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Module Understand Wireless Network Encryption Mechanisms Understand Wireless Network Fundamentals Flow Discuss Different Types of Wireless Network Authentication Methods Discuss and Implement Wireless Network Security Measures...

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Module Understand Wireless Network Encryption Mechanisms Understand Wireless Network Fundamentals Flow Discuss Different Types of Wireless Network Authentication Methods Discuss and Implement Wireless Network Security Measures Understand Wireless Network Encryption Mechanisms The objective of this section is to explain the various encryption mechanisms used in wireless networks, such as WEP encryption, wireless fidelity (Wi-Fi) protected access (WPA) Encryption, Wi-Fi protected access 2 (WPA2) encryption, Wi-Fi protected access 3 (WPA3) encryption. This section also describes the limitations of these encryption mechanisms. Module 11 Page 1427 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Types of Wireless Encryption An |IEEE amendment that specifies security mechanisms for 802.11 wireless networks An encryption algorithm for IEEE 802.11 wireless networks Supports multiple authentication methods, such as token cards, Kerberos, and certificates A proprietary version of EAP developed by Cisco An advanced wireless encryption protocol using TKIP and MIC to provide stronger encryption and authentication A security protocol used in WPA as a replacement for WEP v Copyright © by L All Rights Reserved. Reproduction Is Strictly Prohibited. Types of Wireless Encryption (Cont’d) An upgrade to WPA using AES and CCMP for wireless data encryption A symmetric-key encryption, used in WPA2 as a replacement for TKIP An encryption protocol used in WPA2 for stronger encryption and authentication Integrates EAP standards with WPA2 encryption A centralized authentication and authorization management system A protocol that encapsulates the EAP within an encrypted and authenticated transport layer security (TLS) tunnel A third-generation Wi-Fi security protocol that uses GCMP-256 for encryption and HMAC-SHA-384 for authentication Copyright © by EC IL All Rights Reserved. Reproduction s Strictly Prohibited. Types of Wireless Encryption There are several types of wireless encryption algorithms that can secure a wireless network. Each wireless encryption algorithm has advantages and disadvantages. = 802.11i: It is an IEEE amendment that specifies security mechanisms for 802.11 wireless networks. Module 11 Page 1428 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security = WEP: WEP Exam 212-82 is an encryption algorithm for IEEE 802.11 wireless networks. It is an old wireless security standard and can be cracked easily. = EAP: The Extensible Authentication Protocol (EAP) supports multiple authentication methods, such as token cards, Kerberos, and certificates. = LEAP: Lightweight EAP (LEAP) is a proprietary version of EAP developed by Cisco. = WHPA: It is an advanced wireless encryption protocol using TKIP and Message Integrity Check (MIC) to provide strong encryption and authentication. It uses a 48-bit initialization vector (1V), 32-bit cyclic redundancy check (CRC), and TKIP encryption for wireless security. = TKIP: It is a security protocol used in WPA as a replacement for WEP. = WPA2: It is an upgrade to WPA using AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption. = AES: It is a symmetric-key encryption used in WPA2 as a replacement for TKIP. = CCMP: It is an authentication. = WPA2 Enterprise: It integrates EAP standards with WPA2 encryption. = RADIUS: It is a centralized authentication and authorization management system. = PEAP: It is a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. = WHPA3: It is a third-generation Wi-Fi security protocol that provides new features for personal and enterprise usage. It uses Galois/Counter Mode-256 (GCMP-256) for encryption and the 384-bit hash message authentication code with the Secure Hash encryption protocol used in WPA2 for strong encryption and Algorithm (HMAC-SHA-384) for authentication. Module 11 Page 1429 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Wired Equivalent Privacy (WEP) Encryption WEP is a security protocol defined by the 802.11b standard; it was designed to provide a wireless LAN with a level of i comparable to that of a wired LAN WEP it initiali ) to form stream cipher RC4 for confidentiality and the CRC-32 checksum for integrity of wireless transmissions It has significant vulnerabilities and design flaws and WEP Key Store (K1, K2, K3, K4) [ : I Data T —— i ’P How WEP Works et [ WEP Key I v $ XOR Agorithm €3 : B., v prisnsressdireeseiieeieiennieenen,. ] '>r Keystream....... : : Icv CRC-32 : A Checksum : H : T [ v IPAD 3 aenene AL — KID N Ciphertext. i WEP-encrypted Packet (Frame body of : J ; MAC Frame) Wired Equivalent Privacy (WEP) Encryption WEP was an early attempt to protect wireless networks from security breaches, but as technology improved, it became evident that information encrypted with WEP is vulnerable to attack. We discuss WEP in detail here. What is WEP Encryption? WEP is a component of the IEEE 802.11 WLAN standards. Its primary purpose is to ensure data confidentiality on wireless networks at a level equivalent to that of wired LANs, which can use physical security to stop unauthorized access to a network. In @ WLAN, a user or an attacker can access the network without physically connecting to the LAN. Therefore, WEP utilizes an encryption mechanism at the data link layer for minimizing unauthorized access to the WLAN. This is accomplished by encrypting data with the symmetric Rivest Cipher 4 (RC4) encryption algorithm, which is a cryptographic mechanism used to defend against threats. Role of WEP in Wireless Communication = WEP protects against eavesdropping on wireless communications. = |t attempts to prevent unauthorized access to a wireless network. = |t depends on a secret key shared by a mobile station and an AP. This key encrypts packets before transmission. Performing an integrity check ensures that packets are not altered during transmission. 802.11 WEP encrypts only the data between network clients. Module 11 Page 1430 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Main Advantages of WEP = Confidentiality: It prevents link-layer eavesdropping. = Access Control: It determines who may access data. = Data Integrity: It protects the change of data by a third party. = Efficiency Key Points WEP was developed without any academic or public review. In particular, it was not reviewed by cryptologists during development. Therefore, it has significant vulnerabilities and design flaws. WEP is a stream cipher that uses RC4 to produce a stream plaintext. The length of the WEP and secret key are as follows: = 64-bit WEP uses a 40-bit key = 128-bit WEP uses a 104-bit key = 256-bit WEP uses 232-bit key of bytes that are XORed with Flaws of WEP The following basic flaws undermine WEP’s ability to protect against a serious attack. * = No defined method for encryption key distribution: o Pre-shared keys (PSKs) are set once at installation and are rarely (if ever) changed. o Itis easy to recover the number of plaintext messages encrypted with the same key. RC4 was designed to be used in a more randomized environment than that utilized by WEP: o Asthe PSK is rarely changed, the same key is used repeatedly. o An attacker monitors the traffic and finds different ways to work with the plaintext message. o With knowledge of the ciphertext and plaintext, an attacker can compute the key. = Attackers analyze the traffic from passive data captures and crack WEP keys with the help of tools such as AirSnort and WEPCrack. = Key scheduling algorithms are also vulnerable to attack. How WEP Works = (CRC-32 checksum is used to calculate a 32-bit integrity check value (ICV) for the data, which, in turn, is added to the data frame. = A 24-bit arbitrary number known as the initialization vector (IV) is added key; the WEP key and IV are together called the WEP seed. Module 11 Page 1431 to the WEP Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 = The WEP seed is used as the input to the RC4 algorithm to generate a keystream, which = The IV field (IV + PAD + KID) is added to the ciphertext to generate a MAC frame. is bit-wise XORed data. p ) >IEE I 2 Seed N Data e ? icv. $ - CRC-32 Checksum........................................................... PO v : : : XOR Algorithm........... L L TTTPPPPPPPRPT WEP Key Y RSLIIIITINS. T T YT YT TT TP TP rras. S : WEP ICV to produce the encrypted RN Key Store (K1, K2, K3, K4) § [ of the data and. WEP \_ with a combination e e [ I ] IILELILLED > { Keystream En s e NI s aNs NsssssssseNNRIIRRERRRRRIREES < esesasssNNrseees PAD I KID I Ciphertext ] WEP-encrvpted Packet (Frame body of MAC Frame) Figure 11.7: Operational flow of WEP Module 11 Page 1432 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser