SlideShare ist ein Scribd-Unternehmen logo
1 von 17
DEIOC




Authentication in wireless networks




                       Ludo Stoetenga
                      Chris van den Berg

                     Noordelijke Hogeschool Leeuwarden
DEIOC




Introduction

 ProjectObjectives
 Choices
  –   Network type
  –   Standards
 Types of Connections
 Encryption methods
 Conclusion
DEIOC




Project Objectives

 Investigate through documents and lecture
  studies about the subject and write a
  theoretical description about this.
 Implement one of the encryption methods in
  a Java based environment.
 Write a document how we implemented the
  authentications in Java.
DEIOC




Choices

 Network    types
  –   TTP (Trusted Third Party)
  –   Location Limited
  –   Chain of Thrust
 Standards
  –   802.11b (Wi-Fi)
  –   802.16 (Broadband Wireless Metropolitan Area
      Networks)
DEIOC




TTP (Trusted Third Party)

A  server that is trusted by the clients
 The server defines the protocol for secure
  connections.


                       TTP




     Client A                          Client B
DEIOC




Wireless

               There are two standards
          802.11                    802.16
   Wi-Fi                    MAN
   Authentication           Authentication
     – Open Key                – Open Key
     – Shared Key              – Shared Key
   Encryption               Encryption
     – RC4                     – RSA
                               – TripleDES
DEIOC




Connections

   Client connect with the TTP for the first time
   Client connect with a different Client
DEIOC




Client connect with the TTP


        Client                                                         TTP
                          Given a password (on a paper)




                 Agree on secret key by Diffie-Hellman key agreement



                   Send given password (encrypted with secret key)



                  Send new password (encrypted with secret key)
DEIOC




Client connect with a different Client

        Client A        Agree on Connection               Client B




                                  TTP

                   Get keys from the TTP encrypted with
                             Shared Secret key




                     Send data encrypted with the keys
                           provided by the TTP
DEIOC




Encryption methods

 Diffie-Hellman
              key agreement
 Lamport Scheme
 RSA
 RC4
 TripleDES
DEIOC




 Diffie-Hellman key agreement


                      A                                                   B
                          A and B agree on: P (prime) and G (1 > g > p)


Gen X (0 > x > p-1)                            Gx

                                                                              Gen Y (0 > x > p-1)
                                               Gy




                             A and B can both Compute Gxy
                               Gxy is the Shared secret Key
DEIOC




Lamport scheme

   Shared secret key
   40-bits key



Shared Secret Key


                    One way function   New Shared Secret Key


    Key (40 bits)
DEIOC




RSA

• 2 large primes P and Q
• Compute N = P * Q and F = (P-1)(Q-1)              • N modules
• Select Random: E, 1 < E < F ( gcd(E,F)=1 )        • E Encryption exponent
• Select Unique: D, 1 < D < F ( E * D = 1 (mod F)   • D Decryption Exponent




                A                                      B
                                 Send N, E


                               C = ME mod N
                                                            M = CD mod N
DEIOC




RC4

                     A                                      B
                                Shared secret Key


Encrypt Plain Text
 with Secret Key                  Cipher Text
                                                                Decrypt Cipher text
                                                                 with Secret Key


     • RC4 uses a variable length key from 1 to 256 bytes
     • The stream cipher uses swap and modulate operations to encrypt
DEIOC




DES

              A                                              B
                              Shared secret Key


                                 Cipher Text


                                Encryption
                  L0            L1                    L16
Input                                                                        output
        IP                                                            FP
                  R0      L0 + F(R0,key1)      L15 + F(R15,key16)


 Decryption is simply the inverse of encryption, following the same steps
 as above, but reversing the order in which the subkeys are applied.
 Blocksize is 64 bits
DEIOC




TripleDES

   Triple-DES is just DES with two 48-bit key array’s
    applied in 3 rounds


                            Encryption


      Encrypt (key 1)     Decrypt (key 2)    Encrypt (key 1)



                            Decryption

      Decrypt (key 1)     Encrypt (key 2)    Decrypt (key 1)
DEIOC




Conclusion

 Encryption   methods are not secure
  –   Methods are insecure
  –   Errors by programming
 Standards
  –   RC4
  –   RSA
  –   TripleDES

Weitere ähnliche Inhalte

Was ist angesagt?

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryptionAlexander Decker
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
A TLS Story
A TLS StoryA TLS Story
A TLS Storyereddick
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 

Was ist angesagt? (20)

Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Ch9
Ch9Ch9
Ch9
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
661 665
661 665661 665
661 665
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Unit 1
Unit 1Unit 1
Unit 1
 
Kleptography
KleptographyKleptography
Kleptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 

Andere mochten auch

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authenticationamanchaurasia
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksLeMeniz Infotech
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 

Andere mochten auch (8)

Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
Network security
Network securityNetwork security
Network security
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 

Ähnlich wie Authentication in Wireless Networks

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gatakajiboutin
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gatakaDefconRussia
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingajithc0003
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 

Ähnlich wie Authentication in Wireless Networks (20)

Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gataka
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Internet security
Internet securityInternet security
Internet security
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Day-3 PowerPoint
Day-3 PowerPointDay-3 PowerPoint
Day-3 PowerPoint
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 

Mehr von Chris van den Berg

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafChris van den Berg
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performanceChris van den Berg
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectChris van den Berg
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheChris van den Berg
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - PlatformChris van den Berg
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influenceChris van den Berg
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsChris van den Berg
 

Mehr von Chris van den Berg (10)

Gamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - TelegraafGamification - Contact Center - How to make in happen - Knab - Telegraaf
Gamification - Contact Center - How to make in happen - Knab - Telegraaf
 
Gamification managen op performance
Gamification managen op performanceGamification managen op performance
Gamification managen op performance
 
Workshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana ConnectWorkshop | How to Gamify a contact center @ Kana Connect
Workshop | How to Gamify a contact center @ Kana Connect
 
Gamify a contact center
Gamify a contact centerGamify a contact center
Gamify a contact center
 
Kennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ ConicheKennissessie “Gamification” @ Coniche
Kennissessie “Gamification” @ Coniche
 
Result of the pilot by CAIWAY
Result of the pilot by CAIWAYResult of the pilot by CAIWAY
Result of the pilot by CAIWAY
 
Gamify a callcenter?
Gamify a callcenter?Gamify a callcenter?
Gamify a callcenter?
 
EngageIT - Overview - Platform
EngageIT - Overview - PlatformEngageIT - Overview - Platform
EngageIT - Overview - Platform
 
Irrational behavior & social influence
Irrational behavior & social influenceIrrational behavior & social influence
Irrational behavior & social influence
 
Voorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijsVoorbeeld gestudeerd onderwijs
Voorbeeld gestudeerd onderwijs
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Authentication in Wireless Networks

  • 1. DEIOC Authentication in wireless networks Ludo Stoetenga Chris van den Berg Noordelijke Hogeschool Leeuwarden
  • 2. DEIOC Introduction  ProjectObjectives  Choices – Network type – Standards  Types of Connections  Encryption methods  Conclusion
  • 3. DEIOC Project Objectives  Investigate through documents and lecture studies about the subject and write a theoretical description about this.  Implement one of the encryption methods in a Java based environment.  Write a document how we implemented the authentications in Java.
  • 4. DEIOC Choices  Network types – TTP (Trusted Third Party) – Location Limited – Chain of Thrust  Standards – 802.11b (Wi-Fi) – 802.16 (Broadband Wireless Metropolitan Area Networks)
  • 5. DEIOC TTP (Trusted Third Party) A server that is trusted by the clients  The server defines the protocol for secure connections. TTP Client A Client B
  • 6. DEIOC Wireless There are two standards 802.11 802.16  Wi-Fi  MAN  Authentication  Authentication – Open Key – Open Key – Shared Key – Shared Key  Encryption  Encryption – RC4 – RSA – TripleDES
  • 7. DEIOC Connections  Client connect with the TTP for the first time  Client connect with a different Client
  • 8. DEIOC Client connect with the TTP Client TTP Given a password (on a paper) Agree on secret key by Diffie-Hellman key agreement Send given password (encrypted with secret key) Send new password (encrypted with secret key)
  • 9. DEIOC Client connect with a different Client Client A Agree on Connection Client B TTP Get keys from the TTP encrypted with Shared Secret key Send data encrypted with the keys provided by the TTP
  • 10. DEIOC Encryption methods  Diffie-Hellman key agreement  Lamport Scheme  RSA  RC4  TripleDES
  • 11. DEIOC Diffie-Hellman key agreement A B A and B agree on: P (prime) and G (1 > g > p) Gen X (0 > x > p-1) Gx Gen Y (0 > x > p-1) Gy A and B can both Compute Gxy Gxy is the Shared secret Key
  • 12. DEIOC Lamport scheme  Shared secret key  40-bits key Shared Secret Key One way function New Shared Secret Key Key (40 bits)
  • 13. DEIOC RSA • 2 large primes P and Q • Compute N = P * Q and F = (P-1)(Q-1) • N modules • Select Random: E, 1 < E < F ( gcd(E,F)=1 ) • E Encryption exponent • Select Unique: D, 1 < D < F ( E * D = 1 (mod F) • D Decryption Exponent A B Send N, E C = ME mod N M = CD mod N
  • 14. DEIOC RC4 A B Shared secret Key Encrypt Plain Text with Secret Key Cipher Text Decrypt Cipher text with Secret Key • RC4 uses a variable length key from 1 to 256 bytes • The stream cipher uses swap and modulate operations to encrypt
  • 15. DEIOC DES A B Shared secret Key Cipher Text Encryption L0 L1 L16 Input output IP FP R0 L0 + F(R0,key1) L15 + F(R15,key16)  Decryption is simply the inverse of encryption, following the same steps as above, but reversing the order in which the subkeys are applied.  Blocksize is 64 bits
  • 16. DEIOC TripleDES  Triple-DES is just DES with two 48-bit key array’s applied in 3 rounds Encryption Encrypt (key 1) Decrypt (key 2) Encrypt (key 1) Decryption Decrypt (key 1) Encrypt (key 2) Decrypt (key 1)
  • 17. DEIOC Conclusion  Encryption methods are not secure – Methods are insecure – Errors by programming  Standards – RC4 – RSA – TripleDES