Click here to load reader
View
641
Download
1
Tags:
Embed Size (px)
2. Wi-Fi Protected Access (WPA)
3. WPA Authentication Modes Encryption uses TKIP, AES optional Encryption uses TKIP, AES optional Local access control Centralized access control Shared secret used for authentication RADIUS used for authentication and key distribution Authentication server not required Authentication server required Personal (PSK Authentication) Enterprise (802.1X Authentication) 4. WPA Authentication Process 5. Purpose of Each WPA Phase
6. Unicast Keys: Four-Way Handshake 7. Group Key Handshake 8. WPA: Longer Key, Longer Initialization Vector IV = initialization vector 9. WPA: Per-Packet Key Mixing IV = initialization vector 10. Message Integrity Check
11. WPA Pre-Shared Key (PSK) Authentication: Offline Dictionary Attack 12. WPA2 and IEEE 802.11i
13. IEEE 802.11i and AES Encryption
14. WPA/WPA2/802.11i Comparison Enterprise Enterprise SOHO No test, specification Test devices for compliance Test devices for compliance Allows ad hoc Ad hoc not supported Ad hoc not supported 128-bit AES encryption cipher 128-bit AES encryption cipher 128-bit RC4 w/ TKIP encryption cipher 802.1X authentication 802.1X authentication/PSK 802.1X authentication/PSK 802.11i WPA2 WPA 15. 802.11i Key Caching and Preauthentication
16. Cisco Centralized Key Management 17. Summary
18.