16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Wireless</strong> LAN <strong>Security</strong> 419<br />

Frame<br />

header<br />

40-bit WEP key<br />

<br />

24-bit IV<br />

IV header<br />

IV<br />

Pad Key<br />

ID<br />

RC4<br />

algorithm<br />

Encrypted<br />

Frame body<br />

RC4<br />

key stream<br />

ICV<br />

Figure 18.7 : Data integrity in WEP<br />

X<br />

Data ICV<br />

Data<br />

CRC-32<br />

WEP, ICV is implemented as a Cyclic Redundancy Check-32 bits (CRC-32) checksum<br />

which breaks this assumption. The reason for this is that CRC-32 is linear and is not<br />

cryptographically computed, i.e., the calculation of the CRC-32 checksum does not use a<br />

key/shared secret. Also, this means that the CRC32 has the following interesting property:<br />

CRC(X ⊕ Y) CRC(X) ⊕ CRC(Y)<br />

Now, if X represents the payload of the 802.11 packet over which the ICV is calculated,<br />

the ICV is CRC(X) which is appended to the packet. Consider an intruder who wishes<br />

to change the value of X to Z. To do this, they calculate Y X Z. Then she captures<br />

the packet from the air-interface, XORs X with Y and then XORs the ICV with CRC(Y).<br />

Therefore, the packet changes from { X, CRC(X) } to { X Y, CRC(X) CRC(Y) }<br />

or simply { X Y, CRC(X Y) } . If the intruder now re-transmits the packets to the<br />

receiver, the receiver would have no way of telling that the packet was modified in transit.<br />

This means that we can change bits in the payload of the packet while preserving the<br />

integrity of the packet if we also change the corresponding bits in the ICV of the packet.<br />

Note that an attack like the one described above works because flipping bit x in the<br />

message results in a deterministic set of bits in the CRC that must be flipped to produce<br />

the correct checksum of the modified message. This property stems from the linearity of<br />

the CRC32 algorithm.<br />

Realize that even though the ICV is encrypted (cryptographically protected) along<br />

with the rest of the payload in the packet, it is not cryptographically computed; that<br />

is, calculating the ICV does not involve keys and cryptographic operations. Simply<br />

encrypting the ICV does not prevent an attack like the one discussed above. This is so<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!