NIS Chapter 05 Flashcards

1
Q

Why is it advantageous to have dynamic key instead of static ones?

A

they are not at risk to things like social engineering making them more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After the mutual authentication exchange (EAP). Both the authentication server and the supplicant have information about each other. What information is this?

A
  • seeding material
  • ## key per user and per session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the difference between pre-RSNA and RNSA

A

preRSNA algorithms use static WEP encryption and legacy authentication methods

whereas RSN use TKIP/RC4 or CCMP /AES. dynamic key management and the 802.1X authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of 802.1X/EAP?

A

for authorisiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the advantages of dynamic keys?

A

free of social engineering attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Draw the dynamic WEP authentication process

A

draw / explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is dynamic WEP

A

a WLAN security implementation that was a short term solution until TKIP/RC4 or CCMP/AES became available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of the payload that is protected by WEP encryption? And what layer are these suits found?

A

MSDU payload. Found in layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RSNA? (3)

A

A security standard that requires 802.11 stations to:
- authenticate
- create dynamic keys that are unique
- do the 4 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Between CCMP/AES and TKIP/RC4 which one is optional in RSNA?

A

TKIP/RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With BSS that implement RSNA, a unique key has to be created between each AP and client to encrypt and decrypt all unicast traffic. What is the name of this key?

A

PTK(pairwise transient key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of the broadcast key of a RSNA implementing BSS? And what is it used for?

A

GTK (group temporal key)
- Used to encyrpt and decrypt all multitask and broadcast traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between IBSS and BSS?

A

BSS has an access point
IBSS has no AP. Solely consists of client stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is RSNA in a IBSS implemented interms of key distribution?

A
  • Peer 2 peer communication is used
  • a client must have aPTK with each client it communicates with
  • each STA will create and distribute its GTK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a TSN? And what does it mean?

A

A transition security network is a type of security standard that supports both RSN security as well as legacy security such as WEP.

  • This means that in the network, some clients use either TKIP/RC4 or CCMP/AES but others use static WEP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Since dynamic WEPs are safer, are they considered RSNA?

A

No, they are pre-RSNA

16
Q

Virtual vlans can also be created within a WLAN and each has a different security standard

17
Q

What is an RSN information element?

A

a field found in 802.11 management frame that carries information about the encryption abilities of each station and also whether PSK or 802.1X/EAP is being used

18
Q

What is the AKM service?

A

This consists of one or more algorithms designed to provide key management and authentication

19
Q

What are the 2 options for AKMP authentication?

A

PSK and 802.1X/EAP

20
Q

What AKM operations are used when 802.1X/EAP is used for authentication?

A
  • secure channel : authenticator and AS must have a secure channel established
  • discovery: AP must be discovered either via active probing or passive beaconing
  • Authentication: a
  • ## Master key generation: supplicant and AS generate PMK (pairwise master key)
21
Q

At what point does the controlled port of an authenticator open?

A

once the temporal keys have been created and installed. Only then can the encrypted data frames be forwarded

22
Q

What 5 keys are needed in order to establish a RSNA?

A
  • MSK
  • GMK
  • PMK
  • GTK
  • PTK
23
Q

Break down the hierarchy

A

-called AAA key
MSK are a result of 802.1X/EAP. It is used to create PMK, not used to encrypt or decrypt data

  • PMK uses MSK as seeding material to create it. A new one is generated for each client in each session. It is used to create the PTK
  • GMK is randomly generated at the authenticator. This is used to create GTK

-* These master keys are now used as seeding material for the 4 way handshake in the creation of the temporal keys

  • PTK is derived from the PMK during the 4 way handshake. It is used to encrypt and decrypt all unicast data between a single client station and AP
    Same with GTK but multicast and broadcast
24
Q

What are the 3 components of a PTK?

A
  • KCK: integrity of keys
  • KEK: privacy
  • TK: encrypt and decrypt frames between a supplicant and an authenticator
25
Q

What are EAPOL key frames used for in802.11 2007

A

to exchange cryptographic information between supplicants and authenticators

26
Q

What are the 6 major purposes of the EAPOL key frame?

A
  1. confirm the existence of the PMK at the peer station
  2. ensure that PMK is current
  3. derive PTK from PMK
  4. install PTK on A and STA
  5. transfer GTK from A to STA and install key
  6. Confirm selection of the cipher suites
27
Q

give the formula to derive the PTK?

A

PRF(AA + SA+ SNonce + ANonce + PMK)

28
Q

Describe the 4 way handshake

29
Q

What is the difference between 802.1X/EAP and PSK

A
  • Pre shared keys come with defined passphrase that is configured on the STA and AP. Same key used for all devices connecting to the WLAN
  • 802.1X/EAP uses unique keys for each session oer user, uses the 4 way handshake