NIS Chapter 05 Flashcards

(30 cards)

1
Q

Why is it advantageous to have dynamic key instead of static ones?

A

they are not at risk to things like social engineering making them more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After the mutual authentication exchange (EAP). Both the authentication server and the supplicant have information about each other. What information is this?

A
  • seeding material
  • ## key per user and per session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the difference between pre-RSNA and RNSA

A

preRSNA algorithms use static WEP encryption and legacy authentication methods

whereas RSN use TKIP/RC4 or CCMP /AES. dynamic key management and the 802.1X authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of 802.1X/EAP?

A

for authorisiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the advantages of dynamic keys?

A

free of social engineering attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Draw the dynamic WEP authentication process

A

draw / explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is dynamic WEP

A

a WLAN security implementation that was a short term solution until TKIP/RC4 or CCMP/AES became available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of the payload that is protected by WEP encryption? And what layer are these suits found?

A

MSDU payload. Found in layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RSNA? (3)

A

A security standard that requires 802.11 stations to:
- authenticate
- create dynamic keys that are unique
- do the 4 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Between CCMP/AES and TKIP/RC4 which one is optional in RSNA?

A

TKIP/RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With BSS that implement RSNA, a unique key has to be created between each AP and client to encrypt and decrypt all unicast traffic. What is the name of this key?

A

PTK(pairwise transient key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of the broadcast key of a RSNA implementing BSS? And what is it used for?

A

GTK (group temporal key)
- Used to encyrpt and decrypt all multitask and broadcast traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between IBSS and BSS?

A

BSS has an access point
IBSS has no AP. Solely consists of client stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is RSNA in a IBSS implemented interms of key distribution?

A
  • Peer 2 peer communication is used
  • a client must have aPTK with each client it communicates with
  • each STA will create and distribute its GTK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a TSN? And what does it mean?

A

A transition security network is a type of security standard that supports both RSN security as well as legacy security such as WEP.

  • This means that in the network, some clients use either TKIP/RC4 or CCMP/AES but others use static WEP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Since dynamic WEPs are safer, are they considered RSNA?

A

No, they are pre-RSNA

16
Q

Virtual vlans can also be created within a WLAN and each has a different security standard

17
Q

What is an RSN information element?

A

a field found in 802.11 management frame that carries information about the encryption abilities of each station and also whether PSK or 802.1X/EAP is being used

18
Q

What is the AKM service?

A

This consists of one or more algorithms designed to provide key management and authentication

19
Q

What are the 2 options for AKMP authentication?

A

PSK and 802.1X/EAP

20
Q

What AKM operations are used when 802.1X/EAP is used for authentication?

A
  • secure channel : authenticator and AS must have a secure channel established
  • discovery: AP must be discovered either via active probing or passive beaconing
  • Authentication: a
  • ## Master key generation: supplicant and AS generate PMK (pairwise master key)
21
Q

At what point does the controlled port of an authenticator open?

A

once the temporal keys have been created and installed. Only then can the encrypted data frames be forwarded

22
Q

What 5 keys are needed in order to establish a RSNA?

A
  • MSK
  • GMK
  • PMK
  • GTK
  • PTK
23
Q

Break down the hierarchy

A

-called AAA key
MSK are a result of 802.1X/EAP. It is used to create PMK, not used to encrypt or decrypt data

  • PMK uses MSK as seeding material to create it. A new one is generated for each client in each session. It is used to create the PTK
  • GMK is randomly generated at the authenticator. This is used to create GTK

-* These master keys are now used as seeding material for the 4 way handshake in the creation of the temporal keys

  • PTK is derived from the PMK during the 4 way handshake. It is used to encrypt and decrypt all unicast data between a single client station and AP
    Same with GTK but multicast and broadcast
24
What are the 3 components of a PTK?
- KCK: integrity of keys - KEK: privacy - TK: encrypt and decrypt frames between a supplicant and an authenticator
25
What are EAPOL key frames used for in802.11 2007
to exchange cryptographic information between supplicants and authenticators
26
What are the 6 major purposes of the EAPOL key frame?
1. confirm the existence of the PMK at the peer station 2. ensure that PMK is current 3. derive PTK from PMK 4. install PTK on A and STA 5. transfer GTK from A to STA and install key 6. Confirm selection of the cipher suites
27
give the formula to derive the PTK?
PRF(AA + SA+ SNonce + ANonce + PMK)
28
Describe the 4 way handshake
- 25
29
What is the difference between 802.1X/EAP and PSK
- Pre shared keys come with defined passphrase that is configured on the STA and AP. Same key used for all devices connecting to the WLAN - 802.1X/EAP uses unique keys for each session oer user, uses the 4 way handshake