Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views9 pages

WPA2

WPA2 is a security protocol for Wi-Fi networks that enhances security through AES encryption and is divided into two modes: WPA2-Enterprise for organizations, which uses RADIUS servers for authentication, and WPA2-Personal, which relies on a pre-shared key for access. WPA2-Enterprise is considered the gold standard for wireless security, while WPA2-Personal is commonly used in home networks. Experts recommend transitioning from older protocols like WEP and WPA to WPA2 or the newer WPA3 for improved security.

Uploaded by

mwaisasujoseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

WPA2

WPA2 is a security protocol for Wi-Fi networks that enhances security through AES encryption and is divided into two modes: WPA2-Enterprise for organizations, which uses RADIUS servers for authentication, and WPA2-Personal, which relies on a pre-shared key for access. WPA2-Enterprise is considered the gold standard for wireless security, while WPA2-Personal is commonly used in home networks. Experts recommend transitioning from older protocols like WEP and WPA to WPA2 or the newer WPA3 for improved security.

Uploaded by

mwaisasujoseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

WPA2 Enterprise Authentication: WPA2 PSK

WPA2 is the most recent security protocol developed by the Wi-Fi Alliance. It stands for Wi-
Fi Protected Access 2. Wi-Fi Protected Access 2 is a network security technology generally
used on Wi-Fi networks.WPA2 is an advancement of the WPA Network Protocol. The chief
difference between WPA2 and WPA is that the former further improves the security of a
network as it requires using an even more powerful encryption method called the AES.

WPA2 Enterprise makes use of IEEE 802.1x, which offers enterprise-grade authentication.
WPA2-Enterprise has been around since 2004 and is still a gold standard for wireless
network security by delivering over-the-air encryption and top-level security. WPA2 makes
use of CCMP (Counter Cipher Mode with Block-Chaining Message Authentication Code
Protocol) and AES (Advanced Encryption Standard) algorithms in order to provide more
security to the business enterprises.

WPA Enterprise authentication is usually required in corporate or government environments.


WPA2 Enterprise usually verifies network users through a RADIUS server or it may also use
other authentication servers. WPA2 makes use of 128-bit encryption keys and dynamic
session keys to guarantee the privacy of wireless networks as well as enterprise security. An
authentication type is chosen to match the authentication protocol of the 802.1X server.
Corporate or government environments mostly use Enterprise Mode. WPA2 implements the
full IEEE 802.11i standard.

WPA2- Personal uses pre-shared keys (PSK)

WPA2-Personal or WPA2 Pre-Shared Key (WPA2-PSK) is a widely adopted method to secure


wireless networks. A pre-shared key or passphrase is used for authentication, in the Personal
mode. In a WPA2-PSK that is wpa2-personal, access is granted by common pre-shared key
means a common password at the router level and it does not require an additional
authentication server. Today, most of the enterprise and home segments are using this
method. Anybody who knows the password can join the network by using it.

WPA2-PSK (Pre-Shared Key) requires a single password to get in hold with the wireless
network. It’s commonly a notion that a single password to access Wi-Fi is safe, but it’s only
as much as one trusts the individual using it. Basically WPA2-PSK is a technique of securing a
network using WPA2 with the use of the optional Pre-Shared Key (PSK) authentication. It is
mostly designed for home users without an enterprise authentication server.

To encrypt a network with WPA2-PSK the router is not provided with an encryption key but
rather a plain-English passphrase between certain amounts of characters. The passphrase
along with the network SSID by using a technology called TKIP (for Temporal Key Integrity
Protocol) is used to generate unique encryption keys for each wireless client. Encryption keys
are constantly changed.

WPA2 Enterprise is especially designed for organizations


By using WPA2-Enterprise all the security gaps can be filled i.e.1x authentication for the user
device. In this each user has a unique credential (Username and password or digital
certificate or both) to connect to the wireless network; we can also use x.509 digital
certificates for user device authentication. This method uses a RADIUS server for
authentication. We can set up this authentication in the SMB and the enterprise
organization for better security for network. A digital certificate can be issued self-signed or
can be managed by PKI- public key infrastructure i.e Digicert (public CA).

Organizations that require a government-grade wireless network security should use Wi-Fi
Protected Access 2 Enterprise (WPA2-Enterprise). To better the flexibility of critical networks,
WPA2-Enterprise was lately enhanced with Protected Management Frames, which further
secure WPA2 against packet forging and eavesdropping. All Wi-Fi Certified devices support
WPA2 for additional protection.

Deploying WPA2-Enterprise

In order to deploy WPA2-Enterprise, it requires a RADIUS server that handles the task of
authenticating a user’s network access. The actual authentication process is based on the
802.1X policy and comes in several different systems labeled EAP. As each device is
authenticated before it gets connected, a personal encrypted tunnel is effectively created
between the device and the network.

EAP (Extensible Authentication Protocol) Extensions under WPA and WPA2 Enterprise

The choice of EAP depends on the level of security you need and your server/client
specifications. There are more than ten types of EAP but these three are the most popular
ones.

 PEAP (Protected EAP): In this protocol users are authenticated through the
usernames and passwords they enter while connecting to the network. The easiest
EAP type to implement is PEAP.

 TLS (Transport Layer Security): This type requires more time to implement and
maintain. It is very secure because of both server and client validation is done
with SSL (secure socket layer) certificates. Rather than connecting to the network
with usernames and passwords, end-user devices or computers must have an SSL
certificate file.

 TTLS (Tunneled TLS): This version of TLS doesn't require security certificates and
reduces network management time. TTLS does not have a native support in
Microsoft Windows, hence, it requires a third-party client.

Types of wireless security protocols

Most wireless APs come with the ability to enable one of four wireless encryption standards:
1. Wired Equivalent Privacy (WEP)

2. Wi-Fi Protected Access (WPA)

3. WPA2

4. WPA3

WEP, WPA, WPA2 and WPA3: Which is best?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols,
experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption
protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3,
however. In that case, the next best option is WPA2, which is widely deployed in the
enterprise space today.

At this point, no one should use the original wireless security protocol, WEP, or even its
immediate successor, WPA, as both are outdated and make wireless networks extremely
vulnerable to outside threats. Network administrators should replace any wireless AP or
router that supports WEP or WPA with a newer device that's compatible with WPA2 or
WPA3.

Types of wireless security protocols

Most wireless APs come with the ability to enable one of four wireless encryption standards:

1. Wired Equivalent Privacy (WEP)

2. Wi-Fi Protected Access (WPA)

3. WPA2

4. WPA3

WEP, WPA, WPA2 and WPA3: Which is best?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols,
experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption
protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3,
however. In that case, the next best option is WPA2, which is widely deployed in the
enterprise space today.

At this point, no one should use the original wireless security protocol, WEP, or even its
immediate successor, WPA, as both are outdated and make wireless networks extremely
vulnerable to outside threats. Network administrators should replace any wireless AP or
router that supports WEP or WPA with a newer device that's compatible with WPA2 or
WPA3.

Types of wireless security protocols


Most wireless APs come with the ability to enable one of four wireless encryption standards:

1. Wired Equivalent Privacy (WEP)

2. Wi-Fi Protected Access (WPA)

3. WPA2

4. WPA3

WEP, WPA, WPA2 and WPA3: Which is best?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols,
experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption
protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3,
however. In that case, the next best option is WPA2, which is widely deployed in the
enterprise space today.

At this point, no one should use the original wireless security protocol, WEP, or even its
immediate successor, WPA, as both are outdated and make wireless networks extremely
vulnerable to outside threats. Network administrators should replace any wireless AP or
router that supports WEP or WPA with a newer device that's compatible with WPA2 or
WPA3.

How does WEP work?

Wi-Fi Alliance developed WEP -- the first encryption algorithm for the 802.11 standard --
with one main goal: prevent hackers from snooping on wireless data as it is transmitted
between clients and APs. From its inception in the late 1990s, however, WEP lacked the
strength necessary to accomplish this aim.

WEP uses the RC4 (Rivest Cipher 4) stream cipher for authentication and encryption. The
standard originally specified a 40-bit, preshared encryption key. A 104-bit key later became
available after the U.S. government lifted certain federal restrictions.

An administrator must manually enter and update the key, which combines with a 24-bit
initialization vector (IV) in an effort to strengthen encryption. The small size of the IV
increases the likelihood that users will recycle keys, however, making them easier to crack.
This characteristic, along with several other security flaws and vulnerabilities -- including
problematic authentication mechanisms -- makes WEP a risky choice for wireless security.

Cybersecurity experts identified several severe flaws in WEP in 2001, eventually leading to
industrywide recommendations to phase out the use of WEP in both enterprise and
consumer devices. After investigators traced a large-scale cyber attack against T.J.Maxx in
2007 back to vulnerabilities exposed by WEP, the Payment Card Industry Data Security
Standard prohibited retailers and other entities that process credit card data from using WE
How does WEP work?

Wi-Fi Alliance developed WEP -- the first encryption algorithm for the 802.11 standard --
with one main goal: prevent hackers from snooping on wireless data as it is transmitted
between clients and APs. From its inception in the late 1990s, however, WEP lacked the
strength necessary to accomplish this aim.

WEP uses the RC4 (Rivest Cipher 4) stream cipher for authentication and encryption. The
standard originally specified a 40-bit, preshared encryption key. A 104-bit key later became
available after the U.S. government lifted certain federal restrictions.

An administrator must manually enter and update the key, which combines with a 24-bit
initialization vector (IV) in an effort to strengthen encryption. The small size of the IV
increases the likelihood that users will recycle keys, however, making them easier to crack.
This characteristic, along with several other security flaws and vulnerabilities -- including
problematic authentication mechanisms -- makes WEP a risky choice for wireless security.

Cybersecurity experts identified several severe flaws in WEP in 2001, eventually leading to
industrywide recommendations to phase out the use of WEP in both enterprise and
consumer devices. After investigators traced a large-scale cyber attack against T.J.Maxx in
2007 back to vulnerabilities exposed by WEP, the Payment Card Industry Data Security
Standard prohibited retailers and other entities that process credit card data from using WE

How does WEP work?

Wi-Fi Alliance developed WEP -- the first encryption algorithm for the 802.11 standard --
with one main goal: prevent hackers from snooping on wireless data as it is transmitted
between clients and APs. From its inception in the late 1990s, however, WEP lacked the
strength necessary to accomplish this aim.

WEP uses the RC4 (Rivest Cipher 4) stream cipher for authentication and encryption. The
standard originally specified a 40-bit, preshared encryption key. A 104-bit key later became
available after the U.S. government lifted certain federal restrictions.

An administrator must manually enter and update the key, which combines with a 24-bit
initialization vector (IV) in an effort to strengthen encryption. The small size of the IV
increases the likelihood that users will recycle keys, however, making them easier to crack.
This characteristic, along with several other security flaws and vulnerabilities -- including
problematic authentication mechanisms -- makes WEP a risky choice for wireless security.

Cybersecurity experts identified several severe flaws in WEP in 2001, eventually leading to
industrywide recommendations to phase out the use of WEP in both enterprise and
consumer devices. After investigators traced a large-scale cyber attack against T.J.Maxx in
2007 back to vulnerabilities exposed by WEP, the Payment Card Industry Data Security
Standard prohibited retailers and other entities that process credit card data from using WE
How does WPA work?

The numerous flaws in WEP revealed the immediate need for an alternative. But the
deliberately slow and careful processes required to write a new security specification
conflicted with the urgency of the situation. In response, Wi-Fi Alliance released WPA as an
interim standard in 2003, while IEEE worked to develop a more advanced, long-term
replacement for WEP.

WPA has discrete modes for enterprise users and for personal use. The enterprise mode,
WPA-Extensible Authentication Protocol (WPA-EAP), uses more stringent 802.1x
authentication and requires the use of an authentication server. The personal mode, WPA-
Pre-Shared Key (WPA-PSK), uses preshared keys for simpler implementation and
management among consumers and small offices.

Although WPA is also based on RC4, it introduced several enhancements to encryption --


namely, the use of the Temporal Key Integrity Protocol (TKIP). TKIP contained a set of the
following functions to improve WLAN security:

 use of 256-bit keys;

 per-packet key mixing, which generates a unique key for each packet;

 automatic broadcast of updated keys;

 message integrity check;

 larger IV size using 48 bits; and

 mechanisms to reduce IV reuse.

Wi-Fi Alliance designed WPA to be backward-compatible with WEP to encourage quick, easy
adoption. Network security professionals were able to support the new standard on many
WEP-based devices with a simple firmware update. This framework, however, also meant
the security WPA provided was not as comprehensive as it could have been.

How does WPA2 work?

As the successor to WPA, the WPA2 standard was ratified by IEEE in 2004 as 802.11i. Like its
predecessor, WPA2 also offers enterprise and personal modes.

WPA2 replaces RC4 and TKIP with two stronger encryption and authentication mechanisms:

1. Advanced Encryption Standard (AES), an encryption mechanism; and

2. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP), an authentication mechanism.

Also meant to be backward-compatible, WPA2 supports TKIP as a fallback if a device cannot


support CCMP.
Developed by the U.S. government to protect classified data, AES comprises three symmetric
block ciphers. Each cipher encrypts and decrypts data in blocks of 128 bits using 128-, 192-
and 256-bit keys. Although the use of AES requires more computing power from APs and
clients, ongoing improvements in computer and network hardware have mitigated
performance concerns.

CCMP protects data confidentiality by allowing only authorized network users to receive
data. It uses cipher block chaining message authentication code to ensure message integrity.

WPA2 also introduced more seamless roaming, enabling clients to move from one AP to
another on the same Wi-Fi network without having to reauthenticate, using Pairwise Master
Key (PMK) caching or pre-authentication.

KRACK vulnerability exposes WPA2 flaws

In 2017, Belgian security researcher Mathy Vanhoef discovered a major security flaw in
WPA2, known as the key reinstallation attack (KRACK) vulnerability, which exploits the
reinstallation of wireless encryption keys. While WPA2-Enterprise has a stronger
authentication scheme due to its use of EAP -- compared to WPA2-Personal, which uses
preshared keys -- the KRACK vulnerability exists at the encryption stage. As a result, it affects
all WPA2 implementations.

A new Wi-Fi network connection begins with a cryptographic four-way handshake between
an endpoint and AP in which both devices, through a series of back-and-forth messages,
prove they know a preestablished authentication code -- PMK in enterprise mode and PSK in
personal mode -- without either one revealing it explicitly. Upon authentication, the third
step in the four-way handshake involves the AP passing a traffic encryption key to the client.
If the endpoint doesn't acknowledge it has received the key, the AP assumes a connectivity
issue, resending and reinstalling it repeatedly. KRACK attackers -- who must be within
physical range of both client and network -- can trigger, capture, analyze, manipulate and
replay those retransmissions until they're able to determine the key, break encryption and
gain access to network data.

"The weaknesses are in the Wi-Fi standard itself and not in individual products or
implementations," Vanhoef wrote at the time. "Therefore, any correct implementation of
WPA2 is likely affected."

Industry analysts widely acknowledged KRACK as a serious WPA2 security flaw. The finding
prompted technology providers to quickly roll out software patches to mitigate risk until the
arrival of the next generation of wireless security. But many experts argued the KRACK
vulnerability would prove difficult to exploit in the real world.

"Do patch when you can, but don't panic," cybersecurity researcher Martijn
Grooten tweeted.
The four-way handshake method also makes WPA2 networks with weak passcodes
vulnerable to offline dictionary attacks, a type of brute-force attack that involves
systematically trying hundreds, thousands or millions of pre-compiled possible passwords,
out of earshot of the target network. In this scenario, an attacker might capture a WPA2
handshake, take that information offline and use a computer program to compare it against
a list of likely codes, with the goal of finding one that aligns logically with the available
handshake data. Dictionary attacks are far less likely to succeed against long passwords with
combinations of uppercase and lowercase letters, numbers and special characters.

How does WPA3 work?

In 2018, Wi-Fi Alliance began certification for WPA3, the most recent wireless security
standard and the one experts now consider the most secure. As of July 2020, Wi-Fi Alliance
required all devices seeking Wi-Fi certification to support WPA3.

WPA3 mandates the adoption of Protected Management Frames, which help guard against
eavesdropping and forging. It also standardizes the 128-bit cryptographic suite and disallows
obsolete security protocols. WPA3-Enterprise has optional 192-bit security encryption and a
48-bit IV for heightened protection of sensitive corporate, financial and governmental data.
WPA3-Personal uses CCMP-128 and AES-128.

PA3 addresses WPA2's KRACK vulnerability with a more secure cryptographic handshake,
replacing the PSK four-way handshake with Simultaneous Authentication of Equals (SAE), a
version of the Internet Engineering Task Force's dragonfly handshake in which either client
or AP can initiate contact. Each device then transmits its authentication credentials in a
discrete, one-off message, instead of in a give-and-take, multipart conversation. Importantly,
SAE also eliminates the reuse of encryption keys, requiring a new code with every
interaction. Without open-ended communication between AP and client or encryption key
reuse, cybercriminals can't as easily eavesdrop or insert themselves into an exchange.

SAE limits users to active, on-site authentication attempts -- flagging anyone who has
exceeded a certain number of password guesses. This capability should make the typical Wi-
Fi network more resistant to offline dictionary attacks. By mandating a new encryption
passphrase for each connection, SAE also enables a feature called forward secrecy, which
aims to prevent attackers who have cracked a passcode from using it to decrypt data they
previously captured and saved.

Alongside WPA3, Wi-Fi Alliance also introduced a new protocol called Wi-Fi Easy Connect,
which simplifies the onboarding process for IoT devices that don't have visual configuration
interfaces via a mechanism such as a QR code scan. Finally, an additional feature called Wi-Fi
Enhanced Open makes connecting to public Wi-Fi networks safer by automatically
encrypting information between each client and AP using a new unique key.
In practice, WPA3 is not impervious to threats. Vanhoef, the security expert who discovered
KRACK, and Eyal Ronen, a researcher at Tel Aviv University, published several new security
flaws in WPA3 in 2019. The so-called Dragonblood vulnerabilities included two downgrade
attacks, in which an attacker forces a device to revert to WPA2, and two side-channel
attacks, which enable offline dictionary attacks. Wi-Fi Alliance downplayed the risks,
however, saying vendors could readily mitigate them via software upgrades. Regardless of its
potential vulnerabilities, experts agree WPA3 is the most secure wireless protocol available
today.

You might also like