Print this page
Saturday, 10 November 2012 16:36

Wireless Encryption, Or How Secure is Secure

Written by
Rate this item
(4 votes)

Reading time is around minutes.
Code

Suppose I have a picture that I have been given. This picture is not something that the owner wants shown to the world so they have given me a list of people that can see it. When someone wants to see it I ask them who they are and if their name is on the list I show it to them. However, this plan is not working out that well so the owner decides to add some requirements. Now when someone wants to see the picture they have to show ID. Still people are getting around that with fake IDs, so now the owner gives out a special code word that is unique to each person while still maintaining the requirement for ID. To make things even more secure I have a picture of each person and a copy of their ID. What I have described here is a very simple explanation of the way that some of the different levels of encryption work; from the very basic to much more complex routines. In this article we will be talking about encryption as it relates to wireless access points and we can tell you up front you will be surprised at how insecure some of them are.

Now I apologize to anyone that is actually a cryptographer; my grossly simplistic example above is probably giving you fits. Still it is accurate in the definition of encryption says that it is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. Encryption is used to protect your data from unauthorized access. In wireless communications this is to prevent someone from grabbing your packets out of the air and reading them. Of course nothing is un-crackable so if you can encrypt it someone can find a way to decrypt it. Still the there are options available in even the cheapest wireless devices that can protect you from casual eavesdropping all of them have good points and bad in their use and configuration. We will kick things off with one of the oldest ones the Wired Equivalent Privacy.

WEP -

WEP was originally thought to be able to give you the same privacy as a wired network (as the name implies). When you set it up you create a shared key that is between 10 to 58 Hexadecimal digits. There are three levels of WEP with 64-bit (WEP-40), 128-Bit (WEP-104) and 256-bit (WEP-232) the number after WEP represents the bit length of the key.  There is an added initialization vector (IV) that is 24-bits long that gets joined to the personal key to make up the entire WEP Key. The end user does not see this, but ends up entering a series of ASCII (regular text) to generate the actual Key. In WEP-40 you enter 5 characters for WEP-128 you enter 13 and so on. The way WEP works is simple; when a client tries to connect the access point sends a message back in plain text for the client to encrypt and return. If the client encrypts the message properly you can get in. If not you get denied and you have to try again.

Unfortunately WEP’s simplicity is also a weakness. You see despite the length of the key (even 256-bit WEP) the 24-bit IV is static for each device. This means that if you can capture enough traffic you can recover the key based on repetition of packets on the network It is estimated that every 5,000 packets has the IV repeated in it when using WEP-40 and every 40,000 using WEP-128. This means that it is very possible to crack open a WEP network in a very short time. There are multiple tools on the internet available to do this and some can even run on your average smart phone. The record for cracking open WEP on a busy network is about 2 minutes. Now before you say “my home network is not busy” think of how often you view YouTube, Netflix, Hulu or other streaming media over a wireless connection. Even the simplest home network now sends a large amount of traffic over the air… In other words, WEP is not a good choice for anyone that wants to secure their network.  In fact the use of WEP in a wireless network was the root cause of more than a few corporate network penetrations.

WPA -

Moving up in the chain we come to WPA (Wi-Fi Protected Access). WPA and its follow on WPA2 were responses to problems found in WEP. They were meant to ensure your wireless data is kept secure during transmission. Unlike WEP, WPA did not use a static key. Instead it uses something called TKIP (Temporary Key Integrity Protocol) using this, the system generates a new 128 Bit Key for each packet to prevent the pattern recognition technique used to break WEP. WPA also got away from using CRC (Cyclic Redundancy Check) for packet integrity as CRC was not strong enough to spot spoofed packets in transmission. Instead WPA used a new method that was intended to provide a better mechanism for preventing spoofed, resent and captured packets. However it was discovered that even this new method and TKIP were not secure and both were quickly penetrated and broken. Thank fully the original WPA was only meant as a temporary solution until the more robust WPA 2 came out. In fact some of the core components of WPA were taken from failed attempts to strengthen WEP and contained many of the flaws that doomed the original.


WPA 2 -

Although WPA 2 seems like little more than an extension of WPA it is not, many of the items that were used in WPA are no longer there. The packet integrity check is completely different and instead of relying on the relatively weak TKIP it uses AES (Advanced Encryption Standard).

WPA2 uses a part of AES called CCMP; this requires the use of a 128-key and 128-bit block size making the protocol significantly more secure. CCMP (Counter Cipher Mode Protocol or in its longer name Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) is a combination of CBC-MAC and Counter Cipher Mode. CBC-MAC, or Cipher Block Chaining Message Authentication Code Protocol, replaces both CRC and the integrity check that was used in the original WPA. It is significantly stronger than what can get with either of those two protocols as well as being used to authenticate while CCM is used to protect your data in transit. CCM encapsulates and protects not only the MPDU (MAC Protocol Data Unit or simply Protocol Data Unit) data field, but also the header of the PDU. In this way it protects more of the actual data during transmission than was capable with WEP or WPA.

If you think all of this sounds complicated then you are right, but even this is a very simplified explanation of what is going on to protect your data and this is without getting into what you can do once you add in security certificates and RAIDUS (Remote Access Dial Up Service) to the mix. However you can think of WPA2 as the final example of the protection put on the picture.

To see the picture you have to be on the list and show ID that can be compared to something that already exists (authenticate and integrity) and you must also know the security pass code that is unique to you (Data Protection). Believe it or not all of this extra security is actually faster than using WPA with TKIP or WEP. This is because AES and AES 256 (and improvement on AES where it uses 256-bit keys but still 128-bit Blocks) can all be hardware accelerated. For a long time this was handled by specialty processors inside our wireless devices. Now Intel has pushed AES acceleration into their CPUs to help the client side execute encryption functions even faster. AMD is also working on something to help, but their solution involves a specialty ARM Core inside their CPUs to deal with the extra overhead.

Still more to do -
As with all over encryption schemes, WPA can still be broken. In 2011 the first key recovery techniques were published. However even at its weakest (AES128) you would need 2^126.1 or 91,176,402,658,724,901,139,255,709,019,546,000,000 operations to grab your WPA2 key. This is a factor of four faster than simple brute force when a complex key is used. If you use AES 256 for your WPA 2 protection it is significantly more secure with  3.8197144438389907021237890200902e+76 operations required. Now for those of you not familiar with this type of notation simply move the decimal to the right 76 places and that will get you the proper number.  Again this does not mean you are completely protected there are side-channel attacks that do not try to recover the key, but look for information leaks to get inside the system. Some of these have been around since 2005 and have evolved in complexity which has required the encryption algorithms to evolve as well.  So you can see how encryption in wireless has evolved over time to make sure that your data is protected from unwanted intrusion.

On the opposite side of the coin methods for breaking into these systems have also improved. With the advent of using GPUs for highly parallel compute tasks breaking encryption has become significantly easier. What once took multiple computers days or weeks to do can be done using a few off the shelf GPUs in a matter of hours. This means that security will still have to improve to make sure that our wireless communication is still protected.  The problem is that it is not just the encryption scheme that has to be protected, but also other functions that have been created to make setting up encryption easier. Recently the Wireless Protected Setup was found to have a massive flaw in it that reduced the number of operations needed to break it down to almost triple digits! We covered this when it was discovered and we were shocked to find out that the protocol was designed to reveal almost the entire PIN to a clever attacker which allows them to bypass all of the protections in WPA2.

Although we have touched on the surface of Encryption in wireless communication it is a very complex and broad subject. For example even with a relatively weak encryption scheme like WEP you can effectively block eavesdropping by implementing IPSec on your network or locking your wireless access points to a small list of MAC (Media Access Control) Addresses making it highly unlikely that someone can pirate in on your network or read your data in transit. As we mentioned before you can further harden your security through the use of RAIDUS and security certificates for the server, access points and clients. These all tie into the enterprise implementation of WPA and WPA2. By adding in RADIUS and certificates you make it more difficult for someone to bring an unauthorized system into your network and also you can add an extra layer of data protection as well. You can really go crazy if you have the right hardware available, but for most home networks these are not part of the equation just yet. In a few years we envision home networks that require systems to be setup for access on the network before they can get in. It is already available in the enterprise and it is only a matter of time before we see special dongles that are used to configure a system to access your wireless network. These dongles would install a client certificate, setup the proper wireless security (WPA2 with EAP-TLS or MS-CHAP v2) as well as configure your wireless card to use the right MCS and channel for best reception. Of course this will make managing the home network a little more complicated as you will have to maintain an access control list, but it will also make it much harder to break into from the outside.

In our next article we will cover range and power
Read our first article on wireless speed

What Encryption do you use in your wireless? Tell us in our Forum

Read 10312 times Last modified on Saturday, 10 November 2012 16:45
Sean Kalinich

Latest from Sean Kalinich

Related items