Tutorials - Cal Poly Pomona

advertisement
WTS 2008 Tutorials
T1: Wireless Network Security
A. Cryptographic Primitives for Secure Communication
Instructor: Professor Craig A. Rich, Ph.D., Computer Science
Department, Cal Poly Pomona
Abstract:
Achieving security through cryptographic techniques can be
mysterious. There is an alphabet soup of protocols and products;
many practitioners are left accepting vendors' security claims with
scant understanding of how security is achieved or what risks there
are. A large and potentially confusing variety of security solutions are
built from a relatively small number of primitive cryptographic
components.
This tutorial will introduce you to the basic cryptographic primitives,
and show how they're employed in some popular mechanisms for
secure communication. For each cryptographic primitive, we will
consider its intended uses, efficiency (or lack thereof), and potential
pitfalls. Simple schematic diagrams will be given for typical
deployments of Pretty Good Privacy (PGP) and WiFi Protected Access
(WPA), which are hybrid cryptosystems providing practical
authentication and privacy.
List of Topics:
Cryptographic Primitives
Random Number Generator
Hash Function
Message Authentication Code Function
Compression Function
Symmetric Cipher
Asymmetric Cipher
Illustrated Applications of Cryptographic Primitives
Pretty Good Privacy (PGP)
WiFi Protected Access (WPA)
Instructor's Biography:
Dr. Craig A. Rich is a Professor of Computer Science at Cal Poly
Pomona. He received an M.S. and Ph.D. in Computer Science from
Iowa State University. His academic areas of expertise include
computational complexity theory, language processing, cryptography
and secure communication. Dr. Rich is the principal architect of Cal
Poly Pomona's identity management infrastructure, which provides
unified authentication and authorization across the campus wired and
wireless networks and throughout centrally-provided services on
heterogeneous platforms. His current research interests include elliptic
curve cryptography and identity-based cryptosystems.
B. Wi-Fi Protected Access
Instructor: Professor Tim H. Lin, Ph.D., Electrical and Computer
Engineering Department, Cal Poly Pomona
Abstract:
Wireless network, with its convenience over the tangled wires in wired
network, has its inherent nemesis: the security problem. It is well
known that Wi-Fi is susceptible to attack on its WEP protocol. WPA is
the enhancement with key protocol TKIP to fix the problem on
deployed network cards using WEP, and WPA2 is a solution using more
sophisticated encryption protocol CCMP on the new network cards.
This tutorial will cover WEP and its RC4 cipher, how WEP is attacked,
the security concepts and protocols employed in WPA, the encryption
protocol CCMP based on AES used in WPA2, the authentication
protocol EAP for interoperability, and some real world practices of WAP
and WAP2.
List of Topics:



Wireless Network and Wireless Security
WEP (Wired Equivalent Privacy) and its flaw
o RC4 Stream Cipher
o WEP attack
WPA (Wi-Fi Protected Access)
o Encryption, Key, Authentication
o RC4 enhancement in WPA: Encryption
o TKIP (Temporal Key Integrity Protocol): Key
o MIC: Authentication

WPA2 (IEEE 802.11i)
o CCMP encryption protocol which is AES based
 AES

EAP (Extensible Authentication Protocol)
o EAP-TLS

WPA
o
o
o
/ WPA2 in real world
Wpa_supplicant software
WPA deployment
WPA performance
Instructor's Biography:
Dr. Tim Lin is a professor of Electrical and Computer Engineering at Cal
Poly Pomona. He received B.S. in Electrical Engineering and Ph. D. in
Mathematics from California Institute of Technology. Dr. Lin has
working experience in software industry on development and
management of software for more than 20 years, in aerospace and
commercial sectors. His academic areas of expertise include network
security, computer network, operating systems, Java, C++, and data
structures.
C. Computer Forensics Methodology – Protection After
Security Fails
Instructor: Assistant Professor Gregory H. Carlton, Ph.D., Computer
Information Systems Department, Cal Poly Pomona
Abstract:
It is largely understood that contemporary computing is conducted
within a networked environment, and as a result, much emphasis is
being placed on security practices to protect information assets. Given
the current emphasis on security, we must recognize that frequently
information systems fall victim to unauthorized access. While
continuously improving security techniques promise reduced risks of
unauthorized information exposure, computer forensics provides a
methodology to utilize data as evidence within the legal framework,
thus offering a method to hold those responsible for misusing the
technology accountable for their actions.
Computer forensics methodology must be utilized in order for
computer data to be accepted by the courts as evidence. This
methodology specifies procedures to acquire the original data in a
manner that ensures the authenticity of the evidence, and it provides
forensics computer examiners with physical data from which they can
reconstruct the logical activity that occurred and report their findings.
Computer forensics is a valuable tool available to individuals or
organizations that have fallen victim to information system security
breeches; however, this valuable tool is available only when the proper
methodology is followed to secure and process the data. Many
information technology professionals or managers responsible for
protecting the information technology assets of organizations are
unfamiliar with the essential first steps in forensically protecting data
after an event. This tutorial will introduce the computer forensics
methodology and provide you with the essential information needed to
prevent data from being inadmissible in a court of law.
List of Topics:
Computer Forensics Methodology
Data Acquisition
Data Analysis
Reporting
Instructor’s Biography:
Dr. Greg Carlton is an Assistant Professor of Computer Information
Systems at Cal Poly Pomona. He received his MBA and Ph.D. in
Communication and Information Sciences from the University of
Hawaii. His academic areas of interest include computer forensics and
management information systems. In addition to being an academic
in the field of computer forensics, he is also a practitioner with an
active caseload. He has been qualified as an expert witness, and he
has delivered expert testimony in court. Additionally, he has over 25
years of industry experience within the information technology
industry, including working for IBM and Hewlett-Packard.
Download