WPA and 802.11i (WPA2)
haveIEEE 802.11i - IEEE 802.11 task group “MAC enhancement for wireless security”.
Wi-Fi Protected Access (WiFi Alliance), WPA, is a subset internal in 802.11i.
Compatible with work developed in 802.11i.
Only supports BSS.
Defined to work in actual equipment.
Firmware update only.
Pass-phrase constant and shared, but keys are generated per session.
Used in the AP and station.
WPA has two distinct components.
Authentication, based on 802.1X.
Ciphering based on TKIP (Temporal Key Integrity Protocol).
WPA
Authentication
802.1X (≠ 802.11x) – defined for wired and wireless sessions, as a transport protocol.
EAP (Extensible Authentication Protocol) – like a wrapper for the specific authentication traffic.
Impact of EAP.
Authentication does not traverse the AP (STA - server).
It is possible to use different authentication methods without changing APs.
Defines also have a Pre-Shared Key (PSK).
For local networks
Temporal Key Integrity Protocol (TKIP)
Internal solution with better protection, for actual equipment.
Greater privacy.
Uses the same cipher, but is now associated with the MAC and a larger IV.
“Key rollover” with temporal validity.
Greater integrity.
Integrity separated key.
802.11i (WPA2)
Better than WPA.
Also includes TKIP.
Authentication IBSS (ad-hoc mode)?
RSN (Robust Security Network) protocol.
Authentication and ciphering between APs and stations.
Supports new ciphering protocols, resorting to 802.1x and EAP.
Supports AES (Advanced Encryption Standard) ciphering.
Problems.
It does not cipher control and management frames.
(Disassociate, output power, etc).
Requires new hardware.
WPA* Key Exchange (EAP phase 2)
Done during the Association process.
After Association Request/response frames.
Uses (QoS) Data Frames.
Last updated