CertCities.com -- The Ultimate Site for Certified IT Professionals
Keep on Top of the Latest Certification News: Subscribe to CertCities.com Newsletter Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Saturday: April 5, 2014


 Inside the Kernel  
Emmett Dulaney
Emmett Dulaney


 Going Wireless, Part One
In the first part of this series on going wireless, we'll look at the Wired Equivalent Privacy (WEP) standard to lay some groundwork before tacking the implementation in part two.
by Emmett Dulaney  
6/29/2010 --

As wired connections proceed to go the way of the dial telephone, having an understanding of wireless networking and technology becomes imperative. In the first part of this series on going wireless, we'll look at the Wired Equivalent Privacy (WEP) standard to lay some groundwork before tacking the implementation in part two.

The 802.11 standard includes Wired Equivalent Privacy (WEP) for protecting wireless communications from eavesdropping. WEP relies on a 40-bit or 104-bit secret key that's shared between a mobile station (such as a laptop with a wireless Ethernet card) and an access point (also called a base station). The secret key is used to encrypt data packets before they are transmitted, and an integrity check is performed to ensure that packets aren't modified in transit. The 802.11 standard doesn't explain how the shared key is established. In practice, most wireless LANs use a single key that's shared between all mobile stations and access points. Such an approach, however, doesn't scale very well to an environment such as a college campus because the keys are shared with all users -- and you know how it is if you share a secret with hundreds of people. That's why WEP typically isn't used on large wireless networks, such as the ones at universities. In such wireless networks, you have to use other security approaches, such as SSH (Secure Shell), to log in to remote systems. WEP, however, is good to use on a home wireless network.

WEP has its weaknesses, but it's better than nothing. You can use it in smaller wireless LANs where sharing the same key among all wireless stations isn't an onerous task.

Is WEP Good Enough?
WEP uses the RC4 encryption algorithm, which is known as a stream cipher. Such an algorithm works by taking a short secret key and generating an infinite stream of pseudorandom bits. Before sending the data, the sending station performs an exclusive-OR operation between the pseudorandom bits and the bits representing the data packet, which results in a 1 when two bits are different and 0 if they are the same. The receiver has a copy of the same secret key and generates an identical stream of pseudorandom bits -- and performs an identical exclusive-OR operation between this pseudorandom stream and the received bits. Doing so regenerates the original, unencrypted data packet.

This stream cipher method has a few problems. If a bit is flipped (from a 0 to 1 or vice versa) in the encrypted data stream, the corresponding bit is flipped in the decrypted output, which can help an attacker derive the encryption key. Also, an eavesdropper who intercepts two encoded messages that were encoded with the same streamcan generate the exclusive-OR of the original messages. That knowledge is enough to mount attacks that can eventually break the encryption.

To counter these weaknesses, WEP uses some defenses:

  • Integrity check (IC) field: To make sure that data packets aren't modified in transit, WEP uses an integrity check field in each packet.
  • Initialization vector (IV): To avoid encrypting two messages with the same key stream, WEP uses a 24-bit IV that augments the shared secret key to produce a different RC4 key for each packet. The IV itself is also included in the packet.

Experts say that both these defenses are poorly implemented, making WEP ineffective. IC and IV have two main problems:

  • The integrity check field is implemented by using a checksum algorithm called 32-bit cyclic redundancy code (CRC-32); that checksum is then included as part of the data packet.

Unfortunately, an attacker can flip arbitrary bits in an encrypted message and correctly adjust the checksum so that the resulting message appears valid.

  • The 24-bit IV is sent in the clear (unencrypted). There are only 224 possible initialization vectors (no big challenge for a fast machine), and they have to be reused after running through them all. In other words, the IV is repeated after sending 224, or 16,777,216, packets. The number may sound like a lot, but consider the case that a busy access point sends 1,500-byte packets at a rate of 11 Mbps. Each packet has 12,000 bits (8 x 1,500). That means each second the access point sends 916 packets (11,000,000/12,000). At that rate, the access point sends 16,777,216 packets in 5 hours (16,777,216/916 = 18,315 seconds = 5 hours). That means the IV is reused after 5 hours or less because many messages are smaller than 1,500 bytes. Thus, an attacker has ample opportunities to collect two messages encrypted with the same key stream -- and perform statistical attacks (which amount to trying the possible combinations really fast) to decrypt the message.
Turning to WPA
In 2003, the Wi-Fi Alliance published a specification called Wi-Fi Protected Access (WPA) that replaced the existing WEP standard and improved security by making some changes. For example, unlike WEP, which uses fixed keys, the WPA standard uses Temporal Key Integrity Protocol (TKIP), which generates new keys for every 10K of data transmitted over the network. This makes WPA more difficult to break. In 2004, the Wi-Fi Alliance introduced a follow-on to WPA called Wi-Fi Protected Access 2 (WPA2 -- the second generation of WPA security). WPA2 is based on the final IEEE 802.11i standard, which uses public key encryption with digital certificates and an authentication, authorization, and accounting RADIUS (Remote Authentication Dial-In User Service) server to provide better security for wireless Ethernet networks. WPA2 uses the Advanced Encryption Standard (AES) for data encryption.

Now that the standards have been addressed, in the second part of this series, we'll look at configuring the hardware to allow the Linux workstation to utilize the wireless network.


Emmett Dulaney is the author of several books on Linux, Unix and certification. He can be reached at .

 


More articles by Emmett Dulaney:

-- advertisement --


There are 22 CertCities.com user Comments for “Going Wireless, Part One”
Page 1 of 3
6/20/11: Buddy from RkHGivcgMnHMT says: It was dark when I woke. This is a ray of snsuhine.
7/1/13: michael kors factory outlet from [email protected] says: good share. michael kors factory outlet http://www.michaelkorsioutlet.org/
7/5/13: christianlouboutinoutleta.com from [email protected] says: ths christianlouboutinoutleta.com http://www.christianlouboutinoutleta.com
7/5/13: gucci outlet store from [email protected] says: ths gucci outlet store http://www.guccioutletstore-online.com
7/24/13: Herve Leger uk from [email protected] says: thank you for share! Herve Leger uk http://www.herveleger-outlet.co.uk/
8/30/13: wholesale nfl jersey from [email protected] says: nice articles wholesale nfl jersey http://www.wholesalenflljerseys.com
9/5/13: cheap wholesale nfl jerseys from [email protected] says: nice articles cheap wholesale nfl jerseys http://www.wholesalenflljerseys.com
9/9/13: fake ugg from [email protected] says: thank you for share! fake ugg http://fakeuggr.eu
9/12/13: moncler outlets from [email protected] says: thank you for share! moncler outlets http://www.monclereoutletonline.net
10/2/13: babybootsoutlet.com from [email protected] says: thank you for share! babybootsoutlet.com http://babybootsoutlet.com
First Page   Next Page   Last Page
Your comment about: “Going Wireless, Part One”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top