5 Flashcards

1
Q

How is WPA authentication different from WPA2?

A

WPA authentication uses a pre-shared key (PSK) for authentication, while WPA2 replaced RC4 with Advanced Encryption Standard (AES) encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CCMP and how does it relate to TKIP?

A

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) replaced TKIP (Temporal Key Integrity Protocol) in WPA2, providing stronger encryption for wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of 802.1x Enterprise authentication?

A

802.1x Enterprise authentication ensures that each user has an individual login and password for wireless LAN authentication, replacing the use of pre-shared keys (PSK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the four-way handshake in WPA/WPA2 authentication?

A

The four-way handshake is the process of authentication between a client device (supplicant) and an access point (authenticator) before data is sent across the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is the pairwise master key (PMK) generated?

A

The PMK is created using a password and the network name (SSID), and it is known by both the supplicant and the authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is PBKDF2, and how does it improve hashing for WPA authentication?

A

PBKDF2 (Password-Based Key Derivation Function 2) iterates through multiple rounds of hashing to generate a more secure 256-bit key, improving security for WPA networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the Pairwise Transient Key (PTK)?

A

The PTK is used for encryption and data authentication in the four-way handshake and data transfer between the client device and the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is the group temporal key (GTK) used in WPA/WPA2 authentication?

A

The GTK is a random number generated by the access point and used to encrypt broadcast multicast data between the authenticator and the supplicant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some authentication protocols used in WPA Enterprise authentication?

A

Authentication protocols include basic EAP (Extensible Authentication Protocol) or other variants of EAP for authenticating users on a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the inputs required for the four-way handshake in WPA/WPA2 authentication?

A

The inputs include the pairwise master key (PMK), authenticator nonce (ANonce), supplicant nonce (SNonce), authenticator address (AP MAC address), and supplicant address (client MAC address).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps involved in the four-way handshake in WPA/WPA2 authentication?

A
  1. Nonce Generation: Both the client (supplicant) and the access point (authenticator) generate random nonces (ANonce and SNonce, respectively).
  2. Pairwise Master Key (PMK) Derivation: The PMK is derived using the SSID (network name) and the pre-shared key (PSK).
  3. Pairwise Transient Key (PTK) Generation: The PTK is generated using the PMK, nonces, and MAC addresses of both the client and the access point.
  4. Both parties confirm the integrity of the exchanged messages (usually using a Message Integrity Code, MIC) and install the Pairwise Transient Key (PTK) for secure unicast communication. Additionally, the Access Point (authenticator) sends the Group Temporal Key (GTK) to the client for securing multicast and broadcast communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Nonce, ANonce, and SNonce in the context of wireless security?

A

Nonce: A Nonce (Number Used Once) is a random number generated for a specific purpose, often used in cryptographic protocols to ensure uniqueness.

ANonce (Authenticator Nonce): ANonce is a random number generated by the access point (authenticator) during the authentication process.

SNonce (Supplicant Nonce): SNonce is a random number generated by the client device (supplicant) during the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of Wi-Fi Protected Setup (WPS)?

A

Wi-Fi Protected Setup (WPS) is designed to simplify the process of setting up a wireless network, particularly for non-technical users. However, it has several vulnerabilities and is not considered a secure protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of the Pairwise Transient Key (PTK) in the four-way handshake?

A

The Pairwise Transient Key (PTK) is derived from the PMK, ANonce, SNonce, and MAC addresses. It is used for encryption and data authentication during the four-way handshake and subsequent data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly