encryption, privacy, & authentication chris r chris h mindy c
Post on 19-Dec-2015
224 views
TRANSCRIPT
Encryption, Privacy, & Authentication
Chris R
Chris H
Mindy C
Project Overview
Two ComponentsEvaluation/Authentication
• Setup of each wireless security• Comparison between authentication• Evaluation of encryptions
Cracking• Ease of breaking• Methods used
Authentication
WEP64
WEP128
Authentication
WPA (TKIP, AES) / WPA2 (TKIP/AES)
Security Authentication Time (Seconds)
WEP64 .0047
WEP128 .0049
WPA Personal TKIP 1.013
WPA Personal AES 1.012
WPA2 TKIP/AES 1.013
Authentication
Comparison Between Authentication Periods
Authentication
WPA Personal AES Key
WEP/WPA Notes
WEP key management harder to setup from a user standpointWEP128 Key:
7A08BC60865F25EA684F4801FA
WPA has greater connection overhead / issuesSwitching between WPA and other
securities can cause problems in Windows
Cracking
WEP WEP-64
Packets• Took approximately 40 Min• 530,000 packets
• 416,856 IV’s
Cracking• Took Approximately 1
second• Key: test
WEP WEP-128
• 450,000 IV’s• Failed
• 1.5 Million Packets• 1 Million IV’s
• Success!
WPA
WPA Handshake
• Only one necessary
De-authentication• Aireplay-ng
• Failed
• Manually forced reconnect
Passphrase• 11 Characters
• Dictionary Attack
• Success!
WPA2
WPA 2 Handshake
• Only one needed
De-authentication• Aireplay-ng
• Failed
• Manually Forced reconnect
Passphrase• 12 Letters
• Dictionary Attack• Success!