Wireless encryption
• All wireless computers are radio transmitters and
receivers - anyone can listen in
• Only people with the password can transmit and
listen
• WPA and WPA2
WPA (Wi-Fi Protected Access)
• 2002: WPA was the replacement for serious
cryptographic weaknesses in WEP (Wired Equivalent
Privacy)
• Don’t use WEP
• Needed a short-term bridge between WEP and
whatever would be the successor
• Run on existing hardware
• WPA: RC4 with TKIP (Temporal Key Integrity Protocol)
• Initialization Vector (IV) is larger and an encrypted
hash
• Every packet gets a unique 128-bit encryption key
Temporal Key Integrity Protocol
• Adds sequence counter - prevents replay attacks
WPA2 and CCMP
• WPA2 certification began in 2004
• AES (Advanced Encryption Standard) replaced RC4
• CCMP (Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol) replaced
TKIP
• CCMP security services
• Data confidentiality (AES), authentication, and access
control