Chapter 4
Chapter 4
Confidentiality : Cryptography
Integrity: Hash
Availability : Redundancy
WLAN, Security Protocol
Message
IV WEP KEY
Concatenation
Concatenation
+
Plaintext
Message
Key reuse: WEP reuses the same encryption key for all packets,
which makes it easier for attackers to crack the key.
Initialization vector (IV) gets reused for multiple packets over time,
which can also be exploited by attackers.
WLAN, Security Protocol
Wired Equivalent Privacy (WEP)
WEP Flaws
In August 2001, researchers from the University of California, Berkeley (notably
Nikita Borisov, Ian Goldberg, and David Wagner) published a paper titled:
"Intercepting Mobile Communications: The Insecurity of 802.11"
They revealed fundamental flaws in the RC4 encryption and IV (Initialization Vector)
reuse in WEP.
Shortly after, practical attacks emerged that allowed real-world WEP keys to be
recovered within minutes using passive packet sniffing.
Tools like:
AirSnort, WEPCrack, Later, Aircrack-ng
made WEP cracking widely accessible by 2003–2004, leading to the protocol being officially
deprecated by the Wi-Fi Alliance in 2004 in favor of WPA.
WLAN, Security Protocol
Wi-Fi Protected Access (WPA)
What is WPA?
A security protocol designed to protect Wi-Fi networks.
Successor to the insecure WEP (Wired Equivalent Privacy).
Introduced in 2003 as an interim solution before WPA2.
Why WPA?
To address critical vulnerabilities in WEP.
Enhance encryption and authentication for wireless networks.
WLAN, Security Protocol
Wi-Fi Protected Access (WPA)
Key Features of WPA
• Encryption:
Uses Temporal Key Integrity Protocol (TKIP).
Enhances WEP encryption by introducing dynamic keys.
Adds a 48-bit Initialization Vector (IV).
Includes a Message Integrity Code (MIC) to prevent tampering.
• Authentication:
Pre-Shared Key (PSK) for personal networks.
Authentification System (802.1X/EAP )
WLAN, Security Protocol
Wi-Fi Protected Access (WPA)
Security Vulnerabilities of WPA
TKIP Weaknesses:
Still uses the RC4 stream cipher, which has known vulnerabilities.
Susceptible to advanced attacks that exploit weaknesses in the
Message Integrity Code (MIC) mechanism.
Vulnerable to TKIP Key Replay Attacks, where an attacker can
intercept and replay packets to disrupt network communication.
If a weak Pre-Shared Key (PSK) is used, WPA is exposed to
dictionary attacks, enabling unauthorized access.
WLAN, Security Protocol
Wi-Fi Protected Access (WPA2)
What is WPA2?
Second generation of Wi-Fi Protected Access (WPA).
Introduced in 2004 to address WPA limitations.
Implements stronger encryption and authentication protocols.
Why WPA2?
Required for Wi-Fi Certified devices since 2006.
Provides robust security for personal and enterprise networks.
WLAN, Security Protocol
Wi-Fi Protected Access (WPA2)
Key Features of WPA2
• Encryption:
WPA2 typically uses CCMP (Counter Mode / Cipher Block
Chaining Message Authentication Code Protocol) for
encryption, which is based on the AES (Advanced Encryption
Standard) cipher.
• Authentication:
WPA2-Personal: Pre-Shared Key (PSK).
WPA2-Enterprise: Centralized 802.1X/EAP authentication.
• Data Integrity (MIC (Message Integrity Code)):
MIC is calculated using AES in CBC-MAC mode (Cipher Block
Chaining Message Authentication Code).
WLAN, Security Protocol
WPA2 Process
Phase (1): The AP and the client will agree on the security policy
(authentication and pre-authentication method).
Phase (4): All keys generated in phase (3) will be used by the CCMP
protocol to provide data confidentiality and integrity.
WLAN, Security Protocol
WPA2 Process
Phase (1):
After the standard open authentication, the client will send his
response in the association request message which will be validated
by an association response from the access point.
WLAN, Security Protocol
WPA2 Process
Phase (1):
After the standard open authentication, the client will send his
response in the association request message which will be validated
by an association response from the access point.
WLAN, Security Protocol
WPA2 Process
Phase (1):
After the standard open authentication, the client will send his
response in the association request message which will be validated
by an association response from the access point.
WLAN, Security Protocol
WPA2 Process
Phase (1): Agreeing on the security policy
Prop Request
Prop Response + RSN IE
CCMP Mcast, CCMP Ucast, 802.1x auth
The security protocols for unicast traffic (CCMP, TKIP etc.) – the
pairwise cipher suite.
The security protocols for multicast traffic (CCMP, TKIP etc.) – the group
cipher suite.
WLAN, Security Protocol
WPA2 Process
Phase (2)
At the end of this phase, the authentication server will send a
"Radius Accept" message to the access point, containing the MK
and a final EAP Success message for the client.
WLAN, Security Protocol
WPA2 Process
Phase (2) : 802.1x authentication
Radius Access
Request Identity
MK derivation MK derivation
EAP messages specific to the chosen method
Radius Accept
MK distribution
802.1X/EAP success
WLAN, Security Protocol
WPA2 Process
Phase (3)
In this phase there are two handshakes:
4-Way Handshake for PTK (Pairwise Transient Key) and GTK (Group Transient
Key) derivation.
The PMK (Pairwise Master Key) derivation depends on what we have used on
the authentication method:
If we used PSK (Pre-Shared Key), then the PMK will be equal to PSK.
If we used an authentication server, then the PMK will be derived from the
802.1X authentication MK.
WLAN, Security Protocol
WPA2 Process
Key derivation and distribution
Phase (3)
Derived key
Derived key
PTK = KCK : Key Confirmation Key + KEK: Key Encryption Key + Temporal Key1 & Key2
WLAN, Security Protocol
WPA2 Process
Key derivation and distribution
Phase (3)
WLAN, Security Protocol
WPA2 Process
4-Way Handshake
Message 1: ANonce Generation and
Transmission
The access point (AP) generates a random
number called ANonce (Authenticator
Nonce).
The AP sends the ANonce to the client as
part of the first handshake message.
ANonce is combined with another nonce
from the client (SNonce) to create the
Pairwise Transient Key (PTK).
WLAN, Security Protocol
WPA2 Process
4-Way Handshake
Message 2: SNonce Generation and Key Derivation
The client (station) generates its own random
number called SNonce (Supplicant Nonce).
Key Derivation:
The client uses:
ANonce (received from the AP),
SNonce (its own),
PMK (Pairwise Master Key, derived from
the Pre-Shared Key or 802.1X handshake),
MAC addresses of both devices.
These values are combined to derive the
Pairwise Transient Key (PTK).
The client sends SNonce back to the AP.
WLAN, Security Protocol
WPA2 Process
4-Way Handshake
Message 3:PTK Confirmation and GTK Transmission
Integrity:
CCMP protects against message tampering.
Replay Protection:
Nonces (ANonce and SNonce) prevent replay
attacks by ensuring unique encryption keys for
each session.
WLAN, Security Protocol
Advantages of WPA2
1. Strong Encryption
• Uses AES (Advanced Encryption Standard), a robust and widely trusted encryption method.
• Replaces the weaker RC4 cipher used in WPA, making WPA2 more secure against modern
attacks.
2. Data Integrity
• Utilizes CCMP (Counter Mode/CBC-MAC Protocol) to ensure data integrity and authenticity.
• Prevents unauthorized modifications to transmitted data.
3. Authentication Options
• Supports two modes:
WPA2-Personal (PSK): Simplified setup for home and small-office networks.
WPA2-Enterprise (802.1X): Advanced authentication for enterprise networks using a
RADIUS server.
• Offers flexibility for diverse network environments.
WLAN, Security Protocol
Advantages of WPA2
4. Backward Compatibility
• Compatible with WPA-enabled devices, easing the transition to WPA2.
6. Enhanced Scalability
• Ideal for both small-scale and large-scale deployments, including home networks,
businesses, and public Wi-Fi.
WLAN, Security Protocol
Advantages of WPA2
7. Replay Attack Protection
• Nonces (unique encryption keys per session) are used to prevent replay attacks.
8. Industry Standard
• Recognized as a robust security protocol and required for Wi-Fi Certified devices
since 2006.
Disadvantages of WPA2
1. Vulnerable to the physical layer attacks:
Like all Wi-Fi security standard, the WPA2 can't stand in front of the
physical layer attacks like:
• Data flooding.
• Access points failure.
Disadvantages of WPA2
5. No Protection Against Rogue Access Points:
WPA2 (personal mode)cannot inherently detect or prevent attacks involving
rogue access points that impersonate legitimate networks.
KRACK Attack:
WPA2 was found to
be vulnerable to
the Key
Reinstallation
Attack (KRACK),
which exploits a
flaw in the four-
way handshake
process to
intercept
encrypted data.
WLAN, Security Protocol
WPA2, KRACK Attack
WLAN, Security Protocol
3. Forward Secrecy
Even if the network key is compromised, previous communication sessions remain
secure because WPA3 generates unique encryption keys for each session.
6. Simplified IoT Device Connections
Wi-Fi Easy Connect, simplifying the process of connecting IoT devices that lack a user interface.
WLAN,
•WPA3 incorporates
Security Protocol
Key Features of WPA3
4. 192-Bit Security Suite
WPA3-Enterprise offers a 192-bit encryption level, aligning with Commercial
National Security Algorithm (CNSA) requirements for government and enterprise
use.