Security and Cooperation in Wireless Networks
Georg-August University Göttingen
The security of existing wireless networks
- Cellular networks
- GSM
- UMTS
- WiFi LANs
- Bluetooth
The security of existing wireless networks Cellular networks GSM o - - PowerPoint PPT Presentation
The security of existing wireless networks Cellular networks GSM o UMTS o WiFi LANs Bluetooth Security and Cooperation in Wireless Networks Georg-August University Gttingen Security in Wireless Networks Wireless networks are
Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Georg-August University Göttingen
The security of existing wireless networks
1
Georg-August University Göttingen
The security of existing wireless networks
2
Georg-August University Göttingen
The security of existing wireless networks
3
Georg-August University Göttingen
The security of existing wireless networks
4
Georg-August University Göttingen
The security of existing wireless networks
5
Georg-August University Göttingen
The security of existing wireless networks
6
Georg-August University Göttingen
The security of existing wireless networks
7
IMSI IMSI A8 A3 K RAND CK SRES IMSI Auth: CK, RAND, SRES Triplets RAND A8 A3 K RAND CK’ SRES’ Ack: SRES’ SRES=SRES’?
(Identifies the home network)
home network happens through the backbone
messages sent between MS and the visited network
Georg-August University Göttingen
The security of existing wireless networks
– After each successful authentication the visited network send a TMSI to the subscriber (encrypted with CK) which will be mapped to IMSI by the visited network and will be used for next authentications
8
Georg-August University Göttingen
The security of existing wireless networks
9
Georg-August University Göttingen
The security of existing wireless networks
10
Georg-August University Göttingen
The security of existing wireless networks
11
Generation of cryptographic material
SQN:
(Sequence Number)
RAND Authentication vector
(RAND,XRES,CK,IK,AUTN) XRES:expected response to RAND AUTN: Authentication Tocken
K IMSI/TMSI User authentication request:
decode SQN, verify MAC (to check if RAND is generated by home network)
(greater than the last one stored)
User authentication response: RES Compare RES and XRES
Will use CK for confidentiality and IK for integrity
K
) , , , ( 1 : ( ) || || ) ( : (
K RAND AMF SQN f MAC MAC AMF AK SQN AUTN
AMF:
(Authentication and Key Management Field)
Georg-August University Göttingen
The security of existing wireless networks
12
Generate SQN Generate RAND f1 f2 f3 f4 f5 K AMF MAC (Message Authentication Code) XRES (Expected Response) CK (Cipher Key) IK (Integrity Key) AK (Anonymity Key) AMF: Authentication and Key Management Field AUTN: Authentication Token AV: Authentication Vector MAC: Message Authentication Key AK: Used to encrypt SQN
Georg-August University Göttingen
The security of existing wireless networks
13
USIM: User Services Identity Module f1 f2 f3 f4 K XMAC (Expected MAC) RES (Result) CK (Cipher Key) IK (Integrity Key) f5 RAND AK SQN
AMF MAC AUTN
Georg-August University Göttingen
The security of existing wireless networks
14
Georg-August University Göttingen
The security of existing wireless networks
15
Georg-August University Göttingen
The security of existing wireless networks
beacon
16 scanning on each channel association request association response STA AP “connected”
AP: access point STA: Mobile Station
Georg-August University Göttingen
The security of existing wireless networks
17 AP
Internet
Georg-August University Göttingen
The security of existing wireless networks
18
Georg-August University Göttingen
The security of existing wireless networks
19
Georg-August University Göttingen
The security of existing wireless networks
– RC4 is initialized with the shared secret (between STA and AP) – RC4 produces a pseudo-random byte sequence (key stream) – this pseudo-random byte sequence is XORed to the message
– shared secret is the same for each message – 24-bit IV changes for every message
and XOR them together to achieve (M1 M2); since messages are far from pseudo-random sequences the attacker will be likely to succeed to open it.
20
Georg-August University Göttingen
The security of existing wireless networks
21
IV secret key
message || CRC(message)
message IV IV secret key
message || CRC(message)
encode decode K K K: pseudo-random sequence IV: Initial Value ICV: Integrity Check Value (= CRC(M) K)
ICV
Georg-August University Göttingen
The security of existing wireless networks
22 id:X | key:abc id:Y | key:abc id:Z | key:abc key:abc id:X | key:def id:Y | key:ghi id:Z | key:jkl id:X | key:def id:Y | key:ghi id:Z | key:jkl
default key key mapping key
Georg-August University Göttingen
The security of existing wireless networks
23
Georg-August University Göttingen
The security of existing wireless networks
24
Georg-August University Göttingen
The security of existing wireless networks
25
Georg-August University Göttingen
The security of existing wireless networks
space is used up in around 7 hours
sequence of IVs
are readily available to an attacker
26
Georg-August University Göttingen
The security of existing wireless networks
– stream ciphers alone are OK (RC4) – challenge-response protocols for entity authentication are OK – but they shouldn’t be combined ( K in authentication is a 128 bit RC4 output on IV and the shared secret)
– encrypting a message digest to obtain an ICV is a good principle – but it doesn’t work if the message digest function is linear wrt to the encryption function
is extremely difficult to tell if a system is secure or not
27
Georg-August University Göttingen
The security of existing wireless networks
28
Georg-August University Göttingen
The security of existing wireless networks
– integrity protection and encryption is based on AES cipher (and not on RC4 anymore) – nice solution, but needs new hardware cannot be adopted immediately
– integrity protection is based on Michael (we will skip the details of that) – encryption is based on RC4, but WEP’s problems have been avoided – runs on old hardware (after software upgrade)
29
Georg-August University Göttingen
The security of existing wireless networks
30 Supplicant
services
Authenticator
authentication Server
LAN authenticator system supplicant auth server sys port
controls
Georg-August University Göttingen
The security of existing wireless networks
31
Georg-August University Göttingen
The security of existing wireless networks
32
Georg-August University Göttingen
The security of existing wireless networks
33
PMK (pairwise master key):
The session key established between the STA and the AP in the authentication procedure
PTK (pairwise transient keys):
(four keys (PTK) derived from PMK) (128 bits each)
GTK (group transient keys):
802.1X authentication key derivation in STA and AP key generation in AP protection Sent to every STA unicast message trans. between STA and AP broadcast messages trans. from AP to STAs protection protection
Georg-August University Göttingen
The security of existing wireless networks
AP : generate ANonce AP STA : ANonce STA : generate SNonce and compute PTK STA AP : SNonce | MICKIK AP : compute PTK, generate GTK, verify MIC (using computed KIK, to verify that the STA has the PMK too) AP STA : ANonce | KeyReplayCtr | {GTK}KEK | MICKIK STA : verify MIC and install keys STA AP : KeyReplayCtr+1 | MICKIK ----- acknowledment of the third message AP : verify MIC and install keys
34
MICKIK : Message Integrity Code (computed by the mobile device using the key-integrity key) KeyReplayCtr: the start of a sequence number used to prevent replay attacks in data transmission, KEK: key encryption key
Georg-August University Göttingen
The security of existing wireless networks
35
Georg-August University Göttingen
The security of existing wireless networks
36
Georg-August University Göttingen
The security of existing wireless networks
37
IV data encryption key from PTK key mix (phase 1) key mix (phase 2)
lower 16 bits upper 32 bits 128 bits 48 bits
message key IV
3x8 = 24 bits 104 bit
IV d
dummy byte
Georg-August University Göttingen
The security of existing wireless networks
38
Georg-August University Göttingen
The security of existing wireless networks
39
Georg-August University Göttingen
The security of existing wireless networks
40
Georg-August University Göttingen
The security of existing wireless networks
41
Georg-August University Göttingen
The security of existing wireless networks
42
Georg-August University Göttingen
The security of existing wireless networks
43
Georg-August University Göttingen
The security of existing wireless networks
44
Georg-August University Göttingen
The security of existing wireless networks
45
Georg-August University Göttingen
The security of existing wireless networks
– The attacker can track the device by tracking the use of the given device address
– The encryption key can be broken with much less effort than brute force attack
46
Georg-August University Göttingen
The security of existing wireless networks
47