Wireless encryption
• All wireless computers are radio transmitters
and receivers
• Anyone can listen in
• Only people with the password can transmit and
listen
• WPA and WPA2
WPA (Wi-Fi Protected Access)
• 2002: WPA was the replacement for serious
cryptographic weaknesses in WEP
• (Wired Equivalent Privacy)
• Don’t use WEP
• Needed a short-term bridge between WEP and
whatever would be the successor
• Run on existing hardware
• WPA: RC4 with TKIP (Temporal Key Integrity Protocol)
• Initialization Vector (IV) is larger and
an encrypted hash
• Every packet gets a unique 128-bit encryption key
Temporal Key Integrity Protocol
WPA2 and CCMP
• CCMP (Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol) replaced TKIP
• CCMP block cipher mode
• Uses AES for data confidentiality
• 128-bit key and a 128-bit block size
• Requires additional computing resources
• CCMP security services
• Data confidentiality (AES), authentication,
and access control
Wireless security modes
• Configure the authentication on your wireless
access point / wireless router
• WPA2-Enterprise / WPA2-802.1X
• Authenticates users individually with an
authentication server (i.e., RADIUS, TACACS+)
• Add additional factors
RADIUS (Remote Authentication Dial-in User Service)
• One of the more common AAA protocols
• Supported on a wide variety of platforms and
devices
• Not just for dial-in
• RADIUS services available on almost any server operating system
TACACS
• Terminal Access Controller
• Access-Control System
• Remote authentication protocol
• Created to control access to dial-up lines to
ARPANETTACACS+
What are the characteristic features of RADIUS?
Primarily used for network access
Combines authentication and authorization
Encrypts only the password in the access-request packe
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet
Primarily used for device administration
Separates authentication and authorization