An organization’s wireless network can contain confidential information – Not everyone is allowed access
Authenticate the users before granting access – Who gets access to the wireless network? – Username, password, multi-factor authentication
Ensure that all communication is confidential – Encrypt the wireless data
Verify the integrity of all communication – The received data should be identical to the original sent data – A message integrity check (MIC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
WPA (Wi-Fi Protected Access)
A
2002: WPA was the replacement for serious cryptographic weaknesses in WEP (Wired Equivalent Privacy) – Don’t use WEP
Needed a short-term bridge between WEP and whatever would be the successor – Run on existing hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Wireless encryption
A
All wireless computers are radio transmitters and receivers – Anyone can listen in
Solution: Encrypt the data – Everyone has an encryption key
Only people with the right key can transmit and listen – WPA2 and WPA3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
WPA2 and CCMP
A
Wi-Fi Protected Access II (WPA2) – WPA2 certification began in 2004
CCMP block cipher mode – Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, or Counter/CBC-MAC Protocol
CCMP security services – Data confidentiality with AES encryption – Message Integrity Check (MIC) with CBC-MAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
WPA3 and GCMP
A
Wi-Fi Protected Access 3 (WPA3) – Introduced in 2018
GCMP block cipher mode – Galois/Counter Mode Protocol – A stronger encryption than WPA2
GCMP security services – Data confidentiality with AES – Message Integrity Check (MIC) with – Galois Message Authentication Code (GMAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
The WPA2 PSK problem
A
WPA2 has a PSK brute-force problem – Listen to the four-way handshake – Some methods can derive the PSK hash without the handshake – Capture the hash
With the hash, attackers can brute force the pre-shared key (PSK)
This has become easier as technology improves – A weak PSK is easier to brute force – GPU processing speeds – Cloud-based password cracking
Once you have the PSK, you have everyone’s wireless key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
SAE
A
WPA3 changes the PSK authentication process – Includes mutual authentication – Creates a shared session key without sending that key across the network – No more four-way handshakes, no hashes, no brute force attacks
Simultaneous Authentication of Equals (SAE) – A Diffie-Hellman derived key exchange with an authentication component – Everyone uses a different session key, even with the same PSK – An IEEE standard - the dragonfly handshake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Wireless security modes
A
Configure the authentication on your wireless access point / wireless router
Open System – No authentication password is required
WPA/2/3-Personal / WPA/2/3-PSK – WPA2 or WPA3 with a pre-shared key – Everyone uses the same 256-bit key
WPA/2/3-Enterprise / WPA/2/3-802.1X – Authenticates users individually with an authentication server (i.e., RADIUS)