190 likes | 379 Views
Encryption, Privacy, & Authentication. Chris R Chris H Mindy C. Project Overview. Two Components Evaluation/Authentication Setup of each wireless security Comparison between authentication Evaluation of encryptions Cracking Ease of breaking Methods used. Authentication. WEP64 WEP128.
E N D
Encryption, Privacy, & Authentication Chris R Chris H Mindy C
Project Overview • Two Components • Evaluation/Authentication • Setup of each wireless security • Comparison between authentication • Evaluation of encryptions • Cracking • Ease of breaking • Methods used
Authentication • WEP64 • WEP128
Authentication • WPA (TKIP, AES) / WPA2 (TKIP/AES)
Authentication • Comparison Between Authentication Periods
Authentication • WPA Personal AES Key
WEP/WPA Notes • WEP key management harder to setup from a user standpoint • WEP128 Key: 7A08BC60865F25EA684F4801FA • WPA has greater connection overhead / issues • Switching between WPA and other securities can cause problems in Windows
WEP • WEP-64 • Packets • Took approximately 40 Min • 530,000 packets • 416,856 IV’s • Cracking • Took Approximately 1 second • Key: test
WEP • WEP-128 • 450,000 IV’s • Failed • 1.5 Million Packets • 1 Million IV’s • Success!
WPA • WPA • Handshake • Only one necessary • De-authentication • Aireplay-ng • Failed • Manually forced reconnect • Passphrase • 11 Characters • Dictionary Attack • Success!
WPA2 • WPA 2 • Handshake • Only one needed • De-authentication • Aireplay-ng • Failed • Manually Forced reconnect • Passphrase • 12 Letters • Dictionary Attack • Success!