25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security<br />

The airborne nature of WiFi inherently makes it susceptible to security risks. No<br />

longer hindered by the need to gain access to a wire, malicious users attempting<br />

to capture data transfers must only gain proximity to the intended victim. As<br />

such, several encryption protocols have been coupled with WiFi in order to<br />

secure the data transferred using WiFi.<br />

Wireless Equivalent Privacy (WEP)<br />

Initially, WEP was used to secure WiFi communications. It uses RC4, or<br />

ARCFOUR, stream cipher to provide confidentiality. Additionally, WEP employs<br />

a 33-bit cyclic redundancy check (CRC-32) to ensure data integrity. However,<br />

WEP uses a shared encryption key to which all users must have access in order<br />

to authenticate with the WAP. This compromises the security of the network<br />

because current hacking technology can decode the key using freely distributed<br />

programs. Additionally, WEP security, because it employs a stream cipher, is<br />

susceptible to stream cipher attacks. Due to these <strong>and</strong> other shortcomings, WEP<br />

has been outdated by WiFi Protected Access (WPA <strong>and</strong> WPA2).<br />

WiFi Protected Access (WPA)<br />

Created by the Wi-Fi Alliance, WPA also employs a pass phrase concept similar<br />

to that of the WEP implementation. However, WPA uses distributed private keys<br />

administered by an 802.1X authentication server.<br />

Note: A public-shared key (PSK) mode can be used, but it is less secure.<br />

Data encryption is again provided through the RC4 stream cipher, which uses a<br />

128-bit key <strong>and</strong> a 48-bit initialization vector. Security is increased by inserting<br />

dynamic key changes using the Temporal Key Integrity Protocol (TK<strong>IP</strong>). Data<br />

integrity is guaranteed using the Message Integrity Code (MIC) algorithm, also<br />

called Michael’s algorithm.<br />

While this increased security implementation compensates for the faults found<br />

previously with WEP, cryptoanalysts have still found weaknesses in the WPA<br />

architecture. Specifically, Michael’s algorithm was chosen because it still allowed<br />

mobile devices using WPA to communicate with access points still using WEP,<br />

<strong>and</strong> vice versa. However, the algorithm is still susceptible to packet forgery<br />

attacks. To combat this, WPA was enhanced <strong>and</strong> exp<strong>and</strong>ed into WPA2.<br />

WiFi Protected Access (WPA2)<br />

In WPA2, Michael’s algorithm is replaced by the Counter Mode with Cipher Block<br />

Chaining Message Authentication Protocol (CCMP). Because CCMP provides<br />

both data integrity <strong>and</strong> key management using the Advanced Encryption<br />

St<strong>and</strong>ard (AES, also known as Rijndael), it combines both the data integrity <strong>and</strong><br />

Chapter 10. Wireless <strong>IP</strong> 399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!