vii TABLE OF CONTENTS CHAPTER

advertisement
vii
TABLE OF CONTENTS
CHAPTER
1
TITLE
PAGE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGEMENT
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
xiiii
LIST OF FIGURES
xiii
LIST OF ABBREVIATIONS
xv
INTRODUCTION
1.1
Introduction
1
1.2
Problem Background
2
1.3
Problem Statement
4
1.4
Purpose of the Study
5
1.5
Objectives of the Study
5
1.6
Significance of the Study
6
1.7
Scope of the Study
6
1.8
Organization of the Study
6
1.9
Summary
7
viii
2
LITERATURE REVIEW
2.1
Introduction
8
2.2
Definition of Encryption in 802.11i
8
2.3
History of 802.11x Particularly 802.11i
9
2.3.1 Wireless Protocol 802.11b
12
2.3.2 Wireless Protocol 802.11a
13
2.3.3 Wireless Protocol 802.11g
13
2.3.4 Wireless Protocol 802.11n
13
2.3.5 Wireless Protocol 802.11i
14
2.4
2.3.5.1Wired Equivalent Privacy (WEP)
14
2.3.5.2 Wi-Fi Protected Access (WPA)
15
2.3.5.3 Wi-Fi Protected Access 2 (WPA2)
16
Classification of Encryption Components in 802.11i
17
2.4.1 Key Derivation Mechanism in 80211.i
17
2.4.2 Advanced Encryption Standard (AES )
18
2.4.3 CBC – MAC in 802.11i
19
2.4.4 AES in CTR Mode in 802.11i
22
2.4.4.1 Encryption
22
2.4.4.2 Decryption ( De-capsulation)
25
2.5
Framework of AES – CCMP
27
2.6
Mobile Devices and Main Computers
27
2.6.1 Types of Mobile Devices
28
2.6.2 Main Computers
28
Problems of IEEE 802.11 in Main Computers and Mobile
Devices
29
2.7.1 Problems of AES-CCMP in Main Computers
29
2.7.2 Problems of AES-CCMP in Mobile Devices
30
2.7
ix
3
4
2.8
Related Work
31
2.9
Summary
31
RESEARCH METHODOLOGY
3.1
Introduction
32
3.2
Research Framework
33
3.3
Project Requirements
36
3.3.1 Hardware Requirements
36
3.3.2 Software Requirements
36
3.4
Data Analysis
36
3.5
Summary
37
DESIGN AND IMPLEMENTATION FOR MOBILE
DEVICES
4.1
Introduction
38
4.2
AES-CCMP
40
4.3
AES Encryption
41
4.4
Key Expansion of AES
44
4.5
Counter
45
4.6
Convert Input into Byte
46
4.7
Array Copy
46
4.8
Add Pad
48
4.9
Convert Data Byte to Block Byte
49
4.10
Encapsulation
50
4.11
Convert Block Byte Plaintext to Array Byte
51
4.12
Convert Byte to Output
51
x
4.13
Decapsulation
52
4.14
AES Object
53
4.15
Analysis of AES Encryption and Decryption
in Rounds Lower than 10
53
Analysis
54
4.16.1 Generated Key Analysis
55
4.16.2 Ciphertext Analysis Based on
Incremented Key Values
57
4.16
4.17 Randomness of the Values
58
4.18 Attack Analysis
60
4.18.1 Brute Force Analysis
61
4.18.2 Time Memory Tradeoff Analysis
61
4.19 Summary
5
64
DESIGN AND IMPLEMENTATION FOR NON MOBILE
DEVICES
5.1
Introduction
65
5.2
Comparison Between the Required Security in
Mobile Devices and Non-Mobile Devices
65
Comparison between Resources of Three Latest
Technology Laptops
66
Attack Analysis
67
5.4.1 Brute Force
67
5.4.2 Replay Attack
67
5.4.3 Time Memory Tradeoff Analysis
68
Summary
69
5.3
5.4
5.5
xi
6
CONCLUSION
6.1
6.2
Project Achievements
71
6.1.1 Overview of the Study
71
6.1.2 Review of the Results
72
6.1.3 Implication of the results
73
6.1.4 Limitation of the study
73
Recommendations
73
6.2.1 Recommendation Based on Results
74
6.2.2 Recommendation for Future Research
74
REFERENCES
75
xii
LIST OF TABLES
TABLE
TITLE
PAGE
2.1
802.11x Families
10
2.2
WLAN frequencies and Data Rates
14
4.1
Comparison Between Resources of a Sample Mobile
and Laptop
55
Percentage of Avalanche Effect in 1 Bit Change of
Generated Key
56
4.3
Percentage of Avalanche effect in the Cipher
57
4.4
Results of Frequency Test
59
4.5
Results of Runs Test
60
4.6
TMTO Required Time on Rounds 5 to 10
62
4.7
Comparison Between Resource Usage in Rounds 10, 9 and 8
63
4.8
AES –CCMP Proposed Scenarios
63
5.1
IPS in Non-Mobile and Mobile Devices
66
5.2
Resources in Different Laptops
66
5.3
Brute Force Attack on Different Laptops
67
5.4
TMTO Required Time on Rounds 5 to 11
68
4.2
xiii
LIST OF FIGURES
FIGURE
TITLE
PAGE
2.1
Mapping IEEE 802.11 to OSI layered model
10
2.2
Key Generation Mechanism in 802.11i
18
2.3
Main Construction of AES Algorithm
19
2.4
The First Block Format of CBC-MAC
20
2.5
Constructing of Nonce for CBC-MAC
21
2.6
CBC-MAC Structures in 802.11i
21
2.7
The First Block Format of IC
22
2.8
AES-CCMP (Encryption and Authentication)
24
2.9
Decryption Stages and MIC Authentication in AES-CCMP
26
3.1
Research Framework
35
4.1
802.11i CBC –MAC Structure for Authentication-Integrity
40
4.2
IC scheme
41
4.3
AES CCMP Encryption Process
42
4.4
The Relation Between Different Components of AES
43
4.5
Key Generation
44
4.6
Pseudo Code for Key Expansion
45
4.7
Pseudo Code for Convert into Byte Function
46
4.8
Pseudo Code for Array Copy Function
47
4.9
Pseudo Code for Block Counter Function
47
4.10
Pseudo Code for Add Pad Function
48
4.11
Pseudo Code for Convert Data Byte to Block Byte Function
49
4.12
Pseudo Code for Encapsulation Function
50
4.13
Pseudo Code for Convert Block Byte Plaintext to Array
51
xiv
4.14
Pseudo Code for Convert Byte to Output Function
52
4.15
Pseudo Code for Decapsulation Function
52
4.16
Data Flow in Encryption Phase of AES-CCMP
53
4.17
Percentage of Avalanche Effect in 1 Bit Change of
Generated Key
56
Percentage of Avalanche Effect in 1 Bit Change of Key
58
4.18
xv
LIST OF ABBREVIATIONS
AES
-
Advanced Encryption Standard
AS
-
Authentication Server
CBC
-
Cipher Block Chaining
CIA
-
Confidentiality, Integrity, and Availability
CTR
-
Counter
DES
-
Data Encryption Standard
DLS
-
Direct Link Setup
GTK
-
Group Temporal Key
IEEE
-
Institute of Electrical and Electronic Engineers
ISM
-
Industrial, Scientific, and Medical
IV
-
Initial Vector
KCK
-
Key Conformation Key
KEK
-
Key Encryption Key
LAN
-
Local Area Network
LLC
-
Logical Link Control
LT
-
Long Time
MAC
-
Message Authentication Code
MIMO
-
Multiple Input, Multiple Output
MIC
-
Message Integrity Code
MAC
-
Media Access Control
MPDU
-
MAC Protocol Data Unit
NIST
-
National Institute of Standards and Technology
PMK
-
Pairwise Master Key
PHY
-
Physical
PTK
-
Pairwise Transient Key
PN
-
Packet Number
xvi
QoS
-
Quality of Service
RF
-
Radio Frequency
RADIU
-
Remote Access Dial-In User Service
ST
-
Short Time
RSNA
-
Robust Security Network Association
TK
-
Temporal Key
TKIP
-
Temporal Key Integrity Protocol
TMTO
-
Time Memory Trade Off
WEP
-
Wired Equivalent Privacy
WPA
-
Wi-Fi Protected Access
WPA2
-
Wi-Fi Protected Access II
Download