1.6 Securing Wireless Networks Flashcards
Created in 1997, the evolving standards that gives us the methods by which we create wireless local area networks.
IEEE802.11
Most of the amendments to 802.11 have focused on the following.
Performance, frequency range, speed/bandwidth, and security.
The most recent approved 802.11 amendment, incorporated in the standard in 2016. Aggregated bandwidth of 1 Gbps and operates in the 5GHz frequency range. what many people look for today when purchasing new laptops smartphones and access points.
802.11ac
Not officially ratified at the moment, this is the next iteration of 802.11 amendments. Initial support suggests the possibility of aggregated bandwidth of 11 Gbps. Also known as the high efficiency amendment.
802.11ax
New sets of naming conventions proposed by the Wi-Fi alliance
Wi-Fi generational names
Wi-Fi 6 refers to this 802.11 amendment
802.11ax
Attackers can use these to be within range of a wireless network from further away.
High Gain amplifiers and antennas
802.11 amendment that tries to address some of the security shortcomings.
802.11i
This directly translates to the number of possible keys that can be used in cryptographic operations
key length
These restrictions limited the key length of WEP to 40 bits
United States export restrictions
With the RC4 cipher it is critical that this does not repeat
Keys, keying material
This was the security undoing of WEP
Improper key generation. Repeating of the 24 bit initialization vector (IV) that led to potential uncovering of the pre-shared key.
Used by some cryptographic implementations to try and add uniqueness to each encryption operation. This becomes part of the encryption key.
Initialization vectors - IVs
Keyspace for WEP initialization vectors
2^24
A nonprofit organization founded in 1999. goals of the organization were to provide standardization around interoperability, reliability, and the consistency of hardware that leveraged 802.11 technologies.
Wi-Fi alliance
This deprecated protocol is an improvement to how the encryption keys for the underlying RC4 stream cipher are generated
TKIP - temporal key integrity protocol