Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Wireless Network Concepts 63<br />
mixing, a message integrity check, an extended initialization vector (IV), and<br />
dynamic rekeying.<br />
Creating Privacy with WEP<br />
WEP provides for three implementations: no encryption, 64-bit encryption, and<br />
128-bit encryption. No encryption means no privacy. In 64-bit and 128-bit varieties,<br />
the greater the number of characters (bits), the stronger the encryption. The<br />
initial configuration of the AP includes the setup of the shared key, which can be<br />
in the form of either alphanumeric or hexadecimal strings, and must be matched<br />
on the client.<br />
WEP uses the RC4 encryption algorithm, a stream cipher, where both the sender<br />
and the receiver use the stream cipher to create identical pseudorandom strings<br />
from a known shared key. The receiver takes the shared key and identical stream<br />
and reverses the process to gain the plaintext transmission.<br />
The steps in the process are as follows:<br />
1. The plaintext message is run through an integrity check algorithm (the<br />
802.<strong>11</strong> standard specifies the use of CRC-32) to produce an integrity check<br />
value (ICV).<br />
2. This value is appended to the end of the original plaintext message.<br />
3. A“random”24-bitIVisgeneratedandprependedto(addedtothebeginning<br />
of ) the secret key (which is distributed through an out-of-band method)<br />
that is then input to the RC4 Key Scheduling Algorithm (KSA) to generate<br />
a seed value for the WEP pseudorandom number generator (PRNG).<br />
4. The WEP PRNG outputs the encrypting cipher-stream.<br />
5. This cipher-stream is then XOR’d with the plaintext/ICV message to<br />
produce the WEP ciphertext.<br />
6. The ciphertext is then prepended with the IV (in plaintext), encapsulated,<br />
and transmitted. A new IV is used for each frame to prevent the reuse of the<br />
keyfromweakeningtheencryption.WEPincorporatesachecksumintoeach<br />
frame. Any frame not found to be valid through the checksum is discarded.<br />
AUTHENTICATION<br />
There are two authentication methods in the 802.<strong>11</strong> standard: open and sharedkey.<br />
Open authentication is more precisely described as device-oriented authentication<br />
and can be considered a null authentication – all requests are granted.<br />
Without WEP, open authentication leaves the WLAN wide open to any client who<br />
knows the SSID. With WEP enabled, the WEP secret key becomes the indirect<br />
authenticator.<br />
EXAM WARNING<br />
Open authentication can also require the use of a WEP key. Do not assume that just<br />
because the <strong>Network+</strong> exam discusses open authentication that a WEP key should not<br />
be set.