Week 11 Flashcards
(9 cards)
Common WLAN threats
Packet Sniffing (Eaves dropping)
Denial of service (RF jamming)
Rogue Access Points
What is WEP
Wired Equivalent Privacy
Outdated wireless encryption protocol which utilises Stream cipher
Utilises 24bits for IV (Initialisation Vector)
Weakness in WEP
- Capture one challenge and response
- Both plain text and cipher are available
- Key can be obtained through XOR
- Once obtain key stream, easily encrypt other data
Explain 802.11I
Strong message integrity check
Longer IV (48 bits)
Extensible Authentication protocol
Mutual Authentication
Robust Security Network (RSN)
Explain TKIP
Temporal Key Integrity Protocol
-Key Mixing
- Algorithm Message Integrity Code
- Sequence numbers
- Use 48 bit IV size
Explain 802.1x process
- Wireless request access to WLAN, authenticator ask for identitiy and issue temporary encryption key
- Client sends username and password
- AP replays it to the authentication server using another encryption key
- Once authentication server verifies credentials, issue key for TKIP
Explain Digital Signature
- Digital signature used to prove ownership of public key
- Issued by Certificate Authority (CA)
- Key, Information, Owner identitiy, digital signature
Type of EAP (WPA1)
Extensible Authentication Protocol
1. EAP-MD5 (very weak)
2. LEAP (Lightweight EAP), rely on user password srength
3. EAP-TLS (Transport Layer Security),client and server has cert
4. EAP-TTLS (Tunned TLP), server certificate only
5. PEAP (Protected EAP), SESSION key to get network
Explain WPA 2
Uses AES
USE CCM Protocol header
48 bit