vii TABLE OF CONTENTS CHAPTER 1 TITLE PAGE DECLARATION ii DEDICATION iii ACKNOWLEDGEMENT iv ABSTRACT v ABSTRAK vi TABLE OF CONTENTS vii LIST OF TABLES xiiii LIST OF FIGURES xiii LIST OF ABBREVIATIONS xv INTRODUCTION 1.1 Introduction 1 1.2 Problem Background 2 1.3 Problem Statement 4 1.4 Purpose of the Study 5 1.5 Objectives of the Study 5 1.6 Significance of the Study 6 1.7 Scope of the Study 6 1.8 Organization of the Study 6 1.9 Summary 7 viii 2 LITERATURE REVIEW 2.1 Introduction 8 2.2 Definition of Encryption in 802.11i 8 2.3 History of 802.11x Particularly 802.11i 9 2.3.1 Wireless Protocol 802.11b 12 2.3.2 Wireless Protocol 802.11a 13 2.3.3 Wireless Protocol 802.11g 13 2.3.4 Wireless Protocol 802.11n 13 2.3.5 Wireless Protocol 802.11i 14 2.4 2.3.5.1Wired Equivalent Privacy (WEP) 14 2.3.5.2 Wi-Fi Protected Access (WPA) 15 2.3.5.3 Wi-Fi Protected Access 2 (WPA2) 16 Classification of Encryption Components in 802.11i 17 2.4.1 Key Derivation Mechanism in 80211.i 17 2.4.2 Advanced Encryption Standard (AES ) 18 2.4.3 CBC – MAC in 802.11i 19 2.4.4 AES in CTR Mode in 802.11i 22 2.4.4.1 Encryption 22 2.4.4.2 Decryption ( De-capsulation) 25 2.5 Framework of AES – CCMP 27 2.6 Mobile Devices and Main Computers 27 2.6.1 Types of Mobile Devices 28 2.6.2 Main Computers 28 Problems of IEEE 802.11 in Main Computers and Mobile Devices 29 2.7.1 Problems of AES-CCMP in Main Computers 29 2.7.2 Problems of AES-CCMP in Mobile Devices 30 2.7 ix 3 4 2.8 Related Work 31 2.9 Summary 31 RESEARCH METHODOLOGY 3.1 Introduction 32 3.2 Research Framework 33 3.3 Project Requirements 36 3.3.1 Hardware Requirements 36 3.3.2 Software Requirements 36 3.4 Data Analysis 36 3.5 Summary 37 DESIGN AND IMPLEMENTATION FOR MOBILE DEVICES 4.1 Introduction 38 4.2 AES-CCMP 40 4.3 AES Encryption 41 4.4 Key Expansion of AES 44 4.5 Counter 45 4.6 Convert Input into Byte 46 4.7 Array Copy 46 4.8 Add Pad 48 4.9 Convert Data Byte to Block Byte 49 4.10 Encapsulation 50 4.11 Convert Block Byte Plaintext to Array Byte 51 4.12 Convert Byte to Output 51 x 4.13 Decapsulation 52 4.14 AES Object 53 4.15 Analysis of AES Encryption and Decryption in Rounds Lower than 10 53 Analysis 54 4.16.1 Generated Key Analysis 55 4.16.2 Ciphertext Analysis Based on Incremented Key Values 57 4.16 4.17 Randomness of the Values 58 4.18 Attack Analysis 60 4.18.1 Brute Force Analysis 61 4.18.2 Time Memory Tradeoff Analysis 61 4.19 Summary 5 64 DESIGN AND IMPLEMENTATION FOR NON MOBILE DEVICES 5.1 Introduction 65 5.2 Comparison Between the Required Security in Mobile Devices and Non-Mobile Devices 65 Comparison between Resources of Three Latest Technology Laptops 66 Attack Analysis 67 5.4.1 Brute Force 67 5.4.2 Replay Attack 67 5.4.3 Time Memory Tradeoff Analysis 68 Summary 69 5.3 5.4 5.5 xi 6 CONCLUSION 6.1 6.2 Project Achievements 71 6.1.1 Overview of the Study 71 6.1.2 Review of the Results 72 6.1.3 Implication of the results 73 6.1.4 Limitation of the study 73 Recommendations 73 6.2.1 Recommendation Based on Results 74 6.2.2 Recommendation for Future Research 74 REFERENCES 75 xii LIST OF TABLES TABLE TITLE PAGE 2.1 802.11x Families 10 2.2 WLAN frequencies and Data Rates 14 4.1 Comparison Between Resources of a Sample Mobile and Laptop 55 Percentage of Avalanche Effect in 1 Bit Change of Generated Key 56 4.3 Percentage of Avalanche effect in the Cipher 57 4.4 Results of Frequency Test 59 4.5 Results of Runs Test 60 4.6 TMTO Required Time on Rounds 5 to 10 62 4.7 Comparison Between Resource Usage in Rounds 10, 9 and 8 63 4.8 AES –CCMP Proposed Scenarios 63 5.1 IPS in Non-Mobile and Mobile Devices 66 5.2 Resources in Different Laptops 66 5.3 Brute Force Attack on Different Laptops 67 5.4 TMTO Required Time on Rounds 5 to 11 68 4.2 xiii LIST OF FIGURES FIGURE TITLE PAGE 2.1 Mapping IEEE 802.11 to OSI layered model 10 2.2 Key Generation Mechanism in 802.11i 18 2.3 Main Construction of AES Algorithm 19 2.4 The First Block Format of CBC-MAC 20 2.5 Constructing of Nonce for CBC-MAC 21 2.6 CBC-MAC Structures in 802.11i 21 2.7 The First Block Format of IC 22 2.8 AES-CCMP (Encryption and Authentication) 24 2.9 Decryption Stages and MIC Authentication in AES-CCMP 26 3.1 Research Framework 35 4.1 802.11i CBC –MAC Structure for Authentication-Integrity 40 4.2 IC scheme 41 4.3 AES CCMP Encryption Process 42 4.4 The Relation Between Different Components of AES 43 4.5 Key Generation 44 4.6 Pseudo Code for Key Expansion 45 4.7 Pseudo Code for Convert into Byte Function 46 4.8 Pseudo Code for Array Copy Function 47 4.9 Pseudo Code for Block Counter Function 47 4.10 Pseudo Code for Add Pad Function 48 4.11 Pseudo Code for Convert Data Byte to Block Byte Function 49 4.12 Pseudo Code for Encapsulation Function 50 4.13 Pseudo Code for Convert Block Byte Plaintext to Array 51 xiv 4.14 Pseudo Code for Convert Byte to Output Function 52 4.15 Pseudo Code for Decapsulation Function 52 4.16 Data Flow in Encryption Phase of AES-CCMP 53 4.17 Percentage of Avalanche Effect in 1 Bit Change of Generated Key 56 Percentage of Avalanche Effect in 1 Bit Change of Key 58 4.18 xv LIST OF ABBREVIATIONS AES - Advanced Encryption Standard AS - Authentication Server CBC - Cipher Block Chaining CIA - Confidentiality, Integrity, and Availability CTR - Counter DES - Data Encryption Standard DLS - Direct Link Setup GTK - Group Temporal Key IEEE - Institute of Electrical and Electronic Engineers ISM - Industrial, Scientific, and Medical IV - Initial Vector KCK - Key Conformation Key KEK - Key Encryption Key LAN - Local Area Network LLC - Logical Link Control LT - Long Time MAC - Message Authentication Code MIMO - Multiple Input, Multiple Output MIC - Message Integrity Code MAC - Media Access Control MPDU - MAC Protocol Data Unit NIST - National Institute of Standards and Technology PMK - Pairwise Master Key PHY - Physical PTK - Pairwise Transient Key PN - Packet Number xvi QoS - Quality of Service RF - Radio Frequency RADIU - Remote Access Dial-In User Service ST - Short Time RSNA - Robust Security Network Association TK - Temporal Key TKIP - Temporal Key Integrity Protocol TMTO - Time Memory Trade Off WEP - Wired Equivalent Privacy WPA - Wi-Fi Protected Access WPA2 - Wi-Fi Protected Access II