Wireless Cryptographic Protocols 6.3 Flashcards

1
Q

Wireless Encryption

A

All wireless computers are radio transmitters and receivers. Thus anyone could listen in. The solution is to encrypt the data. Even if they captured all the data, they still couldn’t read it through the encryption. Only the people with the WPA or WPA2 password can transmit and listen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wired Equivalent Privacy (WEP)

A

WEP was discovered to have serious cryptographic weaknesses and thus DO NOT USE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wi-Fi Protected Access (WPA)

A

WPA was the solution to replace WEP. WPA used RC4 ciphers with Temporal Key Integrity Protocol (TKIP). WPA takes uses an IV and a 128-bit encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Temporal Key Integrity Protocol (TKIP)

A

Allows a secret root key with an IV. Also adds a sequence counter to prevent replay attacks. Furthermore it implemented a 64-bit message integrity check. Eventually it had it’s own set of vulnerabilities. Eventually was depricated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA2

A

WPA2 began in 2004. Uses Advanced Encryption Standard (AES) instead of RC4 and Counter Mode with Cipher Block Chaining (CCMP) which replaced TKIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Counter Mode with Cipher Block Chaining (CCMP)

A

CCMP is a block cipher mode that uses 128-bit keys and 128-bit block sizes. It provides data confidentiality through AES, authentication, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly