802.11 Security Solutions
Due to WEP's weaknesses both in authentication and in encryption, the IEEE
is currently working to ratify a new standard, 802.11i, that will address both
these critical issues in wireless network security. Although drafts of the
standard have already been written and are being circulated within the engineering
community, vendors have sought at least temporary security fixes to boost their
network security until the new standard is released.
WiFi Protected Access (WPA) is a standard created by the WiFi alliance that
contains a subset of the technologies outlined in the 802.11i draft, and is
the standard in place for current wireless network technology.
Encryption
To upgrade the cryptographic technology, WPA has put forth the Temporal Key
Integrity Protocol (TKIP) as a solution that fixes the major problems with WEP.
Upgrading to TKIP will not require hardware changes, as the cryptographic algorithm
used will still be RC4, as in WEP. In TKIP, the wireless access point and the
device will share a 128-bit key, called the temporal key. This temporal key
is mixed with the transmitter’s MAC address, which results in a Phase
1 key, which is mixed with a 48-bit initialization vector to produce keys that
are unique from packet to packet. The RC4 algorithm uses this key to encrypt
this single data packet. The shared temporal key is also periodically changed
to provide further security. TKIP also provides additional preservation of data
integrity with a message integrity code that uses a one-way hash that is much
more secure than the WEP integrity check value that could be updated by an attacker
without even knowing the WEP key.
Temporal key derivation: This is different in concept because it does not use
the secret master key to directly encrypt data packets, but instead, uses it
to seed a derivation of transient encryption keys to feed into the per-packet
hash function. In 802.11b, the secret key is used directly as the encryption
key. Temporal keys must be recalculated in time before the IV space can be exhausted;
with a 48-bit IV, this allows for a huge number of packets before a new temporal
key is necessary.
However, TKIP is only an interim solution to the encryption problem. TKIP provides
immediate aid to businesses that need to maintain security on their wireless
networks without upgrading their hardware, but 802.11i is working on producing
a standard encryption scheme that makes use of the 128-bit advanced encryption
standard (AES). This scheme, called the counter mode cipher block chaining with
message authentication codes protocol (CCMP) is essentially a replacement for
the WEP functionality. CCMP has a 48-bit IV that seeds both the key derivation
process and the message integrity code for the CCMP packets. CCMP will be phased
in more slowly with TKIP as the immediate encryption solution, because the implementation
of CCMP requires new hardware to handle the robust AES encryption-processes.
While TKIP and CCMP will address the encryption problems that WEP had, there
is still a need for a satisfactory authentication process.
Authentication
The new 802.11i standard will incorporate an authentication protocol similar
to an already-existing standard, called 802.1x. 802.1x is a port-based authentication
system that is used in wired Ethernet systems, which means that modifications
will need to be made in order to provide all the authentication methods needed
for WLANs. Some of these methods include: mutual authentication, key management
and dictionary attack resistance.
In 802.1x, the initial authentication process allows an association between
the wireless client and the access point, although the device is allowed only
to send authentication information at this point and is not permitted to access
the internal network. 802.1x uses Extensible Authentication Protocol (EAP) in
order to handle the authentication requests. The access point then forwards
the authentication information to a back-end server through Remote Authentication
Dial-In User Service (RADIUS) in order to verify the authentication information.
If the client provides the proper information, then the server sends a message
to the AP to grant network access to the AP. After first authentication, the
authentication process will repeat periodically to verify that the client has
not been subverted. A virtue of the EAP is the flexibility it encompasses, since
the mechanism can be easily replaced with a stronger authentication process.
Top of page
|