08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Wireless Network Concepts 63<br />

mixing, a message integrity check, an extended initialization vector (IV), and<br />

dynamic rekeying.<br />

Creating Privacy with WEP<br />

WEP provides for three implementations: no encryption, 64-bit encryption, and<br />

128-bit encryption. No encryption means no privacy. In 64-bit and 128-bit varieties,<br />

the greater the number of characters (bits), the stronger the encryption. The<br />

initial configuration of the AP includes the setup of the shared key, which can be<br />

in the form of either alphanumeric or hexadecimal strings, and must be matched<br />

on the client.<br />

WEP uses the RC4 encryption algorithm, a stream cipher, where both the sender<br />

and the receiver use the stream cipher to create identical pseudorandom strings<br />

from a known shared key. The receiver takes the shared key and identical stream<br />

and reverses the process to gain the plaintext transmission.<br />

The steps in the process are as follows:<br />

1. The plaintext message is run through an integrity check algorithm (the<br />

802.<strong>11</strong> standard specifies the use of CRC-32) to produce an integrity check<br />

value (ICV).<br />

2. This value is appended to the end of the original plaintext message.<br />

3. A“random”24-bitIVisgeneratedandprependedto(addedtothebeginning<br />

of ) the secret key (which is distributed through an out-of-band method)<br />

that is then input to the RC4 Key Scheduling Algorithm (KSA) to generate<br />

a seed value for the WEP pseudorandom number generator (PRNG).<br />

4. The WEP PRNG outputs the encrypting cipher-stream.<br />

5. This cipher-stream is then XOR’d with the plaintext/ICV message to<br />

produce the WEP ciphertext.<br />

6. The ciphertext is then prepended with the IV (in plaintext), encapsulated,<br />

and transmitted. A new IV is used for each frame to prevent the reuse of the<br />

keyfromweakeningtheencryption.WEPincorporatesachecksumintoeach<br />

frame. Any frame not found to be valid through the checksum is discarded.<br />

AUTHENTICATION<br />

There are two authentication methods in the 802.<strong>11</strong> standard: open and sharedkey.<br />

Open authentication is more precisely described as device-oriented authentication<br />

and can be considered a null authentication – all requests are granted.<br />

Without WEP, open authentication leaves the WLAN wide open to any client who<br />

knows the SSID. With WEP enabled, the WEP secret key becomes the indirect<br />

authenticator.<br />

EXAM WARNING<br />

Open authentication can also require the use of a WEP key. Do not assume that just<br />

because the <strong>Network+</strong> exam discusses open authentication that a WEP key should not<br />

be set.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!