Lecture 17: WiFi Security and WPA Flashcards

1
Q

What are the 2 major jobs WiFi security has to do?

A
  • Access control
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the first standard for securing WiFi communication?

A

WEP

Wired equivalent privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is WEP?

A

Designed to prevent unauthorized access to the network

Secure data inflight between the client and the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many bits were WEP keys and what were the 2 parts that formed them?

A

64 or 128 bit key

Formed of:
- Fixed 40 or 104 bit key that acted as the access control password for the network

  • An initialization vector made up the remaining 24 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The initialization vector used in WEP was sent in ___ during authentication

A

clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the authentication process of WEP

A
  • Clear text authentication message is sent to the router
  • Router responds with an initialization vector and 128 bytes of random data
  • Client uses the IV, WEP access password to encrypt the random data and sends it to the router
  • Router checks if the encrypted data mathces the expected result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does WEP handle encryption?

A

Secret WEP key is combined with an IV from the router to create a key

Key is used with an RC4 stream cipher to enrypt the packet data

Packet is sent to the router where its decypted and then sent to the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the RC4 cipher in WEP

A

Stretches the key out so it can encrypt the entire frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the problems with WEP?

A
  • Doesn’t protect user data from other authenticated users
  • RC4 is insecure
  • IV is too short
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What standard was created to replace WEP?

A

WPA

WiFi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of keys were introduced in WPA?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does temporal key integrity protocol generate a session key from?

A
  • WPA authentication password\
  • Client and routers MAC Addresses
  • 2 random nonces generated y client and the router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How long is the IV in WEP?

A

24 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How long is the IV in TKIP?

A

48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does WPA protect messages from being tampered with?

A

Uses Message Integrity Code (MIC)

A keyed function that generates a message signature using 64 bit derived from the session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the problems with WPA?

A
  • MIC while better then CRC-32 was still considered weak
  • RC4 cipher still used to encrypt messages
  • New attacks appeared aimed at the handshaking protocol
17
Q

What standard was created to replace WPA?

A

WPA2-PSK

18
Q

While WPA2 still supported TKIP what was it replaced by?

A

Pre-shared key (PSK)

AES based key mixing and creation system for WPA2

19
Q

What does SHA-1 do in PSK?

A

A hash function that derives keys from a previously shared password and then mixes it with other data

20
Q

Was is AES Counter Mode Cipher Block Chaining Message (CCMP) mode and what standard is it used in?

A

Used in WPA2-PSK

Uses a counter mode cipher for encryption

Each packet has a counter number that is constantly increasing

The counter changes the output encryption key

21
Q

In WPA2-PSK what replaced the old MIC method of signing messages to prevent tampering?

How did it work?

A

AES

Uses chaining block part of CMP to sign messages

Each output cipher block feeds into the cipher function for the next blocking making tampering the message impossible without breaking the chain entirely

22
Q

What standard is the common choice today?

A

WPA2

23
Q

What is the most recent standard?

A

WPA3

24
Q

What changes does WPA3 have from WPA2?

A
  • Uses asymmetric encryption system called simultaneous authentication of equals instead of the old TKIP handshake
  • Still specifics a 128 bit key but up to 192 bits of security for enterprise eployments
25
Q

What is the order of WiFi security standards released?

A
  • WEP
  • WPA
  • WPA2
  • WPA3