30
Wireless LAN Security Ajay K Mathias Govind M Johnes Jose M120445CS M120432CS M120088CS

Improved EAP-SRP in Wireless Network Authentication

Embed Size (px)

DESCRIPTION

Slideshow of our Term Paper presentation on Wireless Network Security Domain.

Citation preview

Page 1: Improved EAP-SRP in Wireless Network Authentication

WirelessLAN

Security

Ajay K MathiasGovind MJohnes Jose

M120445CSM120432CSM120088CS

Page 2: Improved EAP-SRP in Wireless Network Authentication

Introduction

WEP

EAP

Authenticated KEP

Conclusion

Overview

Page 3: Improved EAP-SRP in Wireless Network Authentication
Page 4: Improved EAP-SRP in Wireless Network Authentication

Wireless Networks Extension of Wired networks, without using

wires. IEEE 802.11 (1997)

802.11b (1999), 802.11g (2003), 802.11n (2009)

802.11i (2004) 2 Types : Adhoc & Infrastructural WLAN

Page 5: Improved EAP-SRP in Wireless Network Authentication

Ad Hoc WLAN

• Connect with whichever station• Hop Hop.. Hop Hop..• No device in the middle.

Page 6: Improved EAP-SRP in Wireless Network Authentication

Infrastructure WLAN

Parties Involved Wireless Station Access Point (AP) Ground Station

Terms BSS / ESS SSID Beacon Probe Request,

Response Associate Frame

Request, Response

Page 7: Improved EAP-SRP in Wireless Network Authentication
Page 8: Improved EAP-SRP in Wireless Network Authentication

Security in WLAN Main Point of Concern Multiple Options exists in Wired

Networks. SSID / MAC based Authentication was

used, both of which were spoof-able. Common Attacks Possible

Masquerading Man in the middle Dictionary Attacks

Requirement : Privacy Equivalent to that in Wired Networks

Page 9: Improved EAP-SRP in Wireless Network Authentication

Wired Equivalent Privacy (WEP)

Challenge Response Protocol

Access Point

Station

Random Nonce, C

Response, RInitialization Vector, IV

R = C + KEYSTREAM(S, IV)O

Page 10: Improved EAP-SRP in Wireless Network Authentication

But…..! WEP had the following security Issues

Monitor Challenge Response to compute Keystream.

Obtain S, using Dictionary Attack One side Authentication

Thus….. A better protocol was required WPA

Page 11: Improved EAP-SRP in Wireless Network Authentication
Page 12: Improved EAP-SRP in Wireless Network Authentication

Post WEP security WPA (TKIP) – Temporal Key Integrity

Protocol WPA 2 (CCMP) – Counter mode CBC MAC

Protocol The authentication in both schemes same Authentication same as in 802.11i Former uses RC4 key-stream encryption Latter uses AES with cipher block chaining

Page 13: Improved EAP-SRP in Wireless Network Authentication

AUTHENTICATION IN WPA 3 entities

Supplication (Station) Authenticator (AP – Access Point) Authentication Server (AS)

EAP (Extensible Authentication Protocol) Authentication, Authorization &

Accounting

Page 14: Improved EAP-SRP in Wireless Network Authentication

802.11 Association

EAP/802.1X/RADIUS Authentication

MSK

Authenticator

4-Way Handshake

Group Key Handshake

802.11i Protocol

Data Communication

Supplicant

Authentication Server

Page 15: Improved EAP-SRP in Wireless Network Authentication

AUTHENTICATION METHODS EAP – MD5 EAP – TLS EAP – TTLS EAP – PEAP

Page 16: Improved EAP-SRP in Wireless Network Authentication

EAP – MD5 Basic form Challenge is to send MD5 of password Password not known to AP, AS Drawbacks:

Replay attack possible with MD5(password)

AP is not verified to the supplicant

Page 17: Improved EAP-SRP in Wireless Network Authentication

EAP-TLS Uses SSL/TLS All Entities have Certificates & Pvt. keys Drawbacks:

Infeasible for all stations to have certificates

PKI required to communicate

Page 18: Improved EAP-SRP in Wireless Network Authentication

EAP-TTLS Requires AP to have certificates AP can be verified by AS, supplicants Forms a secure tunnel through which

password can be sent

EAP-PEAP Similar to EAP-TTLS Forms a secure tunnel Authentication of station to AS

independent

Page 19: Improved EAP-SRP in Wireless Network Authentication

KEY AGREEMENT Two types of keys:

TK (Temporal Key) [128] GTK (Group Transient Key) [128]

PMK can be replaced by PSK (Pre Shared Key) [256], but not secure

TK and other keys are derived from PMK (Pairwise Master Key) [256] by 4-way handshake protocol

Page 20: Improved EAP-SRP in Wireless Network Authentication

KEY HIERARCHY

MSK [256] : AS & StationPMK [256] : AP (derived from MSK)PTK = f(PMK) [512]PTK -> TK [128]PTK -> KCK [128]PTK -> KEK [128]

Page 21: Improved EAP-SRP in Wireless Network Authentication

FOUR WAY HANDSHAKE

PTK = prf (PMK,NA,NB,MACA,MACS) PTK = (TK, KCK, KEK)

Calculate PTK

Calculate PTK

Page 22: Improved EAP-SRP in Wireless Network Authentication
Page 23: Improved EAP-SRP in Wireless Network Authentication

EAP-SPEKE

Simple Password-Authenticated Exponential Key Exchange

Diffie-Hellman based Authentication with session key

negotiation Mutual Authentication Withstands Man in the middle attack Withstands Replay attack

Page 24: Improved EAP-SRP in Wireless Network Authentication

Supplicant Authenticator

A = gXa mod pg = f(pd) Xa = secret key

AB = gXb mod pXb = secret key

B

S = H(BXa mod p)n1 = nonce

S(n1)S = H(AXb mod p)n2 = nonce

S(n1, n2)

Verify n1 Verify n2S(n2)

Page 25: Improved EAP-SRP in Wireless Network Authentication

EAP - SRP

EAP-Secure Remote Password Borrows elements from other key

exchange protocol User ID and password-based

authentication

Page 26: Improved EAP-SRP in Wireless Network Authentication

Supplicant Authenticator

A = gXa mod pg = f(pd) Xa = secret key

ID = identifier

A, IDB = (V+gXb) mod pXb = secret key

V = gx mod p x = H(Salt, pd)

Salt,B

x = H(Salt, pd) u = H(A, B) S = (B-gx)Xa+ux mod p K = H(S)

Ma=H(H(pd) + H(g),

H(ID), Salt, A, B, K) u = H(A, B)S = (AVu) Xbmod pK = H(S)Mb=H( Ma, A, K)

Verify n1

Page 27: Improved EAP-SRP in Wireless Network Authentication

Improved EAP-SRP

A = gXa mod p

Ma = H(H(Pd) Xor H(g), H(ID), A) B = (v + gXb) mod

pU = H(A, B)S = (A.Vu)Xb mod pK = H(s)Mb = H(A, B, Ma, k)

A,ID,Ma

Salt, Mb, BU = H(A,B)

S = (B-gx)(Xa+Ux) mod p K = H(S)Mc = H(B, Mb, K) Mc

Session KeyMutual Authentication

Page 28: Improved EAP-SRP in Wireless Network Authentication

Pro

s • Mutual Authentication• No Cleartext

Password Exchange• Works against

Dictionary Attacks, Password Sniffing and Network Traffic Analysis Attacks

• Easier to setup, than Dig Cert based Authentication.

Con

s • Computationally Intensive (Comparitively)

• Narrow domain of choosing primes.

(eg. Reqd : Prime p,q such that p = 2q+1)

Page 29: Improved EAP-SRP in Wireless Network Authentication

References

1. An Efficient Password Authenticated Key Exchange Protocol for WLAN and WIMAX, AK Rai, V Kumar, S Mishra, ICWETT 2011

2. Extensible authentication protocol, Adoba, B., Blunk, L., Vollbrecht, J., Carlson, J. & Levkowetz, E., RFC 3748 2004

3. The SRP Authentication and Key Exchange System, T. Wu, RFC 2945 2000

4. Cryptography and Network Security, Bernard Menesez, Cengage Solutions

Page 30: Improved EAP-SRP in Wireless Network Authentication

Thank You…!