23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28-4 Industrial Communication Systems<br />

CRC<br />

generation<br />

algorithm<br />

Payload<br />

Packet<br />

CRC<br />

RC4<br />

algorithm<br />

Per packet<br />

key<br />

Concatenate<br />

IV and key<br />

IV<br />

Generation<br />

algorithm<br />

Wireless station<br />

Payload<br />

Keystream<br />

24 bits<br />

Plaintext input<br />

XOR<br />

Payload bits<br />

XOR with<br />

keystream<br />

Shared<br />

key<br />

Ciphertext<br />

Radio<br />

interface<br />

XOR<br />

Keystream<br />

Plaintext<br />

output<br />

Initialization<br />

vector<br />

RC4<br />

algorithm<br />

Concatenate<br />

IV and key<br />

CRC<br />

Per packet<br />

key<br />

Access point<br />

Packet<br />

Shared<br />

key<br />

Payload<br />

FIGURE 28.3<br />

RC4 encryption/decryption process.<br />

The basic insecurities of RC4 are<br />

• Pseudorandom IV<br />

• Exclusive OR based<br />

• Weak keys<br />

• Keystream reuse<br />

WEP has been cryptographically broken due to its reuse of IVs. If the attacker can capture enough<br />

data, the attacker can decrypt the encrypted data without ever learning the encryption key. There are<br />

a variety of WEP cracking tools freely available on the Internet, which include, but are not limited to,<br />

AirSnort, Wepcrack, WepAttack, and Asleap-imp [4].<br />

28.2.2.2 WiFi Protected Access<br />

WiFi protected access (WPA) is a security standard based on IEEE 802.11i draft 3 with early TKIP implementations.<br />

The main design goal of WPA was to make this protocol WEP compatible but more secure<br />

and to coordinate vendor solutions for WEP flaws. WPA corrects the problems with WEP by using a<br />

larger key length and improving the handling of IVs. WPA distributes different keys to different users<br />

with an IEEE 802.1X authentication server. A 48 bit IV and a 128 bit key are used with RC4 encryption.<br />

The main elements of WPA are TKIP, message integrity code to ensure that messages are not tampered<br />

with, and the IEEE 802.1X authentication framework. 802.1X defines how to authenticate wired/wireless<br />

clients using authentication mechanisms such as RADIUS or EAP. RADIUS (remote authentication dialin-user<br />

services) is a protocol used to authenticate dial-in users. EAP (extensible authentication protocol)<br />

is a framework authentication protocol used by 802.1X to provide network authentication. One of the<br />

flaws of WPA is pre-shared key (PSK), which allows the administrator to specify a password that must be<br />

known by all users for access to the AP. An offline dictionary attack can be used to recover the PSK if the<br />

password used is not sufficiently long [9].<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!