5. Wifi Protected Access (WPA) Flashcards

1
Q

What type of authentication did WPA use?

A

WPA uses PSK Authentication (Pre-shared key) which was a 256 bit key.

Encryption was RC4 with TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What encryption and authentication does WPA2 use?

A

WPA2 also uses WPA uses PSK Authentication (Pre-shared key) which was a 256 bit key.

Encryption is Advanced Encryption Standard. AES encryption (which replaced RC4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What authentication and encryption did WPA Enterprise have?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What authentication and encryption does WPA2 Enterprise have?

A

Encryption is AES and CCMP

Authentication is Enterprise authentication protocol 801x and EAP / PEAP
means each user have individual log in and password to access the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the authentication process what is the mobile device trying to connect known as?

A

The supplicant (which is actually part of the devices software that helps it connect)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In authentication processes what is the router reffered to as?

A

The authenticater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does WPA authentication occur? (It’s the same for WPA and WPA2)

A

Use Extensible Authentication Protol Over LAn (EAPOL)

Four-Way Handshake between the device and the access point (before data is sent). described below.

Initially both the device and the router will generate a Master Key using the Password & Network Identity (SSID)

Each device (access point and the connecting dvice) generates a Pairwise Master Key (PMK) and also Randomly generated Number (Nonce). PMK is 256 bits long. They send these to each other.

The access point sends the ANonce to the connecting device.

The connecting device sends the SNonce back, also with a PTK (Pairwise Transient Key) (Pand MIC (Message Integrity Code) to the access point.
4 EAPOL packets are sent as part of the authentication process (reffered to as the 4 way handshake.) This handshake process is used to generate the encryption keys.

Session Key Generated

Client Creates Checksum based on the session key and sends a group session key

Checksum Confirmed by Access Point

Session Key Installed

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the PMK (Pairwise Master Key Process)

A

the Pairwisse Master Key (PMK)

  • created using a password that is 8 to 63 characters long along with the SSID.
  • The PMK is known by both the supplicant and the authenticator.
  • PMK is never sent over the network
  • PMK is not used to encrypt packets
  • It is used to generate the PTK (Pairwise Transient Key).
  • it is verified by the PBKDF2 (Password Based Key Derivation Function2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the PTK (Pairwise Transient Key)?

A

is a unique encryption key generated for each wireless client device (supplicant) connected to the network. It is used to encrypt and decrypt data between a specific client device and the wireless access point (router).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the PTK (Pairwise Transient Key) generated?

A

The PTK is derived from four components2:

Pairwise Master Key (PMK): A shared secret key preconfigured on both the wireless access point and the client devices. It serves as the initial key for generating the PTK.

ANonce (Access Point Nonce): A random number generated by the access point to ensure each PTK is unique.

SNonce (Supplicant Nonce): A random number generated by the client device, also used to ensure uniqueness.

MAC Addresses: The MAC addresses of both the access point and the client device are used as additional inputs in the key generation process.

By combining these components and running them through a cryptographic algorithm, the PTK is generated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly