Wireless Encryption
Wireless Encryption
-All wireless computers are radio transmitters and receivers everyone can hear it -Solution: Encrypt the data
Radius
A centralized authentication and authorization system
LEAP
A proprietary WLAN authentication protocol developed by Cisco
AES
A symmetric key encryption used in WPA2 as a replacement for TKIP
WPA2 Enterprise
Adds 802.1X Authentication server authentication -RADIUS, TACACS, LDAP
TKIP
Temporal Key Integrity Protocol
128 bit Temporal Key
Under TKIP, the client starts with a 128 bit 'temporal key' which is combined with the client's MAC address and added to the IV to form a RC4 stream to encrypt data. It also implements a sequence counter to protect against replay attacks.
WPA2
Upgrade from WAP Certification began in 2004 Uses AES (Advanced Encryption Standard) CCMP(Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) replaced TKIP
WEP Encryption
uses 24-bit IV for form stream cipher RC4
802.11i
It is an IEEE enhancement which specifies security mechanisms for 802.11 wireless networks
EAP
Supports multiple authentication modes, such as kerebos, token cards, certificates, etc
TKIP Encryption
Uses RC4 encryption 128 bit keys and 64 bit MIC integrity check.
CCMP
Utilized 128 bit keys and a 48 bit IV for replay detection
WPA
Wi-fi Protected Access Advanced encryption protocol which uses TKIP and RC4 Initialization Vector (IV) is larger and an encrypted hash Every packet gets a unique encryption key
WEP
Wired Equivalent Privacy Different levels of encryption key strength RC4 stream cipher 64-bit or 128-bit key size WEP cryptographic vulnerabilities identified in 2001 The first bytes of the output keystream are "strongly non-random" Don't use WEP