What are some basic facts of IEEE 802.11?
What are some basic facts on WEP?
What are the design flaws of WEP?
How is user authentication done in WEP?
Optional:
Shared Key Authentication:
- AP generates 128 bit RAND
- Mobile device chooses initialization vector IV
- Computes stream cipher RC4( IV k) and performs xor with RAND
- Sends IV, Encrypted RAND back
How can the user authentication be attacked in WEP?
How is encryption and integrity protection done in WEP?
Shared secret k: 40-104 bit
IV: 24 bit
Key K = RC4( IV || k)
Integrity protection:
- Calculate CRC on Message and append
Encryption:
- XOR Message and CRC with K
- IV attached
Why is the integrity protection broken in WEP?
What is a known plaintext attack against WEP encryption?
What is the problem with RC4 usage in WEP?
What is specified in 802.11i?
WLAN security
pre-RSNA:
- WEP
RSNA:
- New AKA
- TKIP (WPA)
- CCMP (WPA2)
What is RSNA in the context of WLAN?
What is difference between WPA and WPA2?
WPA = Wifi-Protected Access
WPA:
- TKIP: Still uses RC4 with wrapper
- Network cards could get patched from WEP
WPA2:
- CCMP: AES based encryption
What is access control realized in 802.11i?
Small networks:
- PSK: pre-shared key
- Authentication using 4-way handshake
- MD and AP agree on PMK (Pairwise Master Key)
Enterprise networks:
- MD and authentication server share credentials
- Authenticate each other and generate PMK
- Auth. server sends PMK to AP
- AP and MD do 4-way handshake
How is the PMK generated in small networks vs. in enterprise networks in 802.11i?
Pairwise Master Key (PMK)
Small networks: PMK = PSK
Enterprise: Generated by authentication server with the help of EAP
What is the result of the 4-way handshake in 802.11i?
The Pairwise Transient Key (PTK) is generated and exchanged
What keys are generated from PTK in 802.11i?
What is the 4-way handshake in 802.11i?
What is EAP?
Extensible Authentication Protocol (EAP):
- Framework for authentication
- Can run directly on data link layer
- 4 message types: Request, Response, Success, Failure
- After initial identification, MD and auth. server exchange messages
- Different authentication methods possible
What are some EAP methods?
EAP-AKA: Based on USIM
EAP-TLS: Based on private/public key
EAP-TTLS: Based on username/ password
EAP-GPSK: Based on pre-shared key
What is TKIP in WLAN?
What is CCMP in WLAN?
Counter Mode CBC MAC Protocol (CCMP):
- Integrity: CBC MAC
- Encryption: Counter Mode 128-bit AES
How is the security algorithm negotiated in 802.11i?
How is mobility handled in 802.11i?
What are known attacks against WPA/WPA2?