📌 1. Core Terms
WEP — Wired Equivalent Privacy (⚠️ Broken & obsolete)
-
Original 802.11 security method.
-
Used RC4, a weak stream cipher.
-
Key sizes: 40-bit and 104-bit.
-
Vulnerabilities:
-
IV reuse → keys crackable within minutes.
-
No strong integrity check.
-
-
Never used today, not on CCNA exams except historically.
PSK — Pre-Shared Key (WPA/WPA2/WPA3-Personal)
-
Authentication mode using a shared passphrase.
-
Used in home / small business networks.
-
Key becomes a Pairwise Master Key (PMK).
-
Vulnerability:
-
Anyone with the PSK can decrypt other users’ traffic (WPA2).
-
-
WPA3 fixes this with SAE.
TKIP — Temporal Key Integrity Protocol (WPA1 only)
-
Introduced as a quick fix for WEP.
-
Still uses RC4, but:
-
Per-packet key mixing.
-
Sequence counter to prevent replay.
-
MIC ("Michael") added.
-
-
Allowed old WEP hardware to upgrade to WPA.
-
Considered deprecated.
MIC — Message Integrity Code (in TKIP)
-
Also called “Michael.”
-
Prevents packet tampering.
-
Still weak by modern standards.
-
Required in WPA/TKIP networks.
AES — Advanced Encryption Standard
-
Industry-standard encryption used across WPA2/3.
-
Strong 128-bit block cipher.
-
Used with:
-
CCMP (WPA2)
-
GCMP (WPA3 / 802.11ac)
-
📡 2. EAP (Extensible Authentication Protocol) & Frameworks
EAP — Extensible Authentication Protocol
-
A framework for authentication, not a single method.
-
Commonly used with 802.1X (Enterprise Wi-Fi).
-
Allows:
-
certificates (EAP-TLS)
-
usernames/passwords (PEAP)
-
tunneled credentials (FAST)
-
-
APs don’t authenticate users — the RADIUS server does.
EAP-FAST — Flexible Authentication via Secure Tunneling
-
Cisco-developed replacement for LEAP.
-
Uses a PAC (Protected Access Credential) instead of certificates.
-
Designed to avoid tunnel vulnerabilities in PEAP/LEAP.
-
Good for environments where PKI is hard to deploy.
EAP-TLS — EAP Transport Layer Security (🔒 Strongest method)
-
Uses client + server certificates.
-
Provides:
-
Mutual authentication.
-
Strong encryption.
-
No passwords to steal.
-
-
Considered the gold standard for Enterprise Wi-Fi (WPA2-Enterprise, WPA3-Enterprise).
LEAP — Lightweight EAP (⚠️ Insecure/obsolete)
-
Cisco proprietary.
-
Used MS-CHAPv2 for authentication → broken.
-
No longer used; replaced by EAP-FAST and modern methods.
PEAP — Protected EAP
-
Uses a TLS tunnel first.
-
Credentials (username/password) exchanged inside the tunnel.
-
Supported everywhere.
-
Used by:
-
Windows NPS
-
Microsoft RADIUS servers
-
-
More secure than LEAP, weaker than certificate-based EAP-TLS.
🛡️ 3. WPA Generations (Wi-Fi Alliance)
WPA (Wi-Fi Protected Access — 2003)
-
Quick replacement for WEP.
-
Security components:
-
TKIP
-
MIC
-
802.1X (Enterprise) or PSK (Personal)
-
-
Now deprecated.
WPA2 (2004–2018)
-
Uses AES with CCMP as the security standard.
-
Still most common today.
-
Modes:
-
WPA2-Personal (PSK)
-
WPA2-Enterprise (802.1X/EAP)
-
WPA3 (2018–present)
-
Current generation.
-
Enhancements:
-
SAE replaces PSK → stronger Personal mode.
-
Mandatory Protected Management Frames (PMF).
-
Enterprise mode supports 192-bit security suite (GCMP-256).
-
-
Best protection against offline dictionary attacks.
🔐 4. Cipher Suites
CCMP — Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
-
Encryption component used with AES.
-
Security provided:
-
Confidentiality → AES-128
-
Integrity → CBC-MAC
-
Replay protection
-
-
The standard encryption method for WPA2.
GCMP — Galois/Counter Mode Protocol
-
Newer, more efficient cipher used in:
-
802.11ac Wave 2
-
WPA3-Enterprise (192-bit version)
-
-
Security provided:
-
Confidentiality → AES-GCM
-
Integrity → Galois Message Authentication Code.
-
-
Faster and more efficient than CCMP.
📌 One-Sentence Summary Table
| Term | Meaning | Modern Status |
|---|---|---|
| WEP | Original security (RC4) | ❌ Broken |
| PSK | Shared password method | ✔️ Used (WPA2/WPA3-Personal) |
| TKIP | WPA1 encryption fix | ❌ Deprecated |
| MIC/Michael | TKIP integrity check | ❌ Weak |
| AES | Encryption algorithm | ✔️ Current standard |
| EAP | Authentication framework | ✔️ Core of Enterprise Wi-Fi |
| EAP-FAST | Cisco PAC-based EAP | ✔️ Legacy but acceptable |
| EAP-TLS | Cert-based EAP (strongest) | ✔️ Best practice |
| LEAP | Cisco MS-CHAPv2 EAP | ❌ Broken |
| PEAP | TLS tunnel + password auth | ✔️ Common |
| WPA | TKIP-based | ❌ Deprecated |
| WPA2 | CCMP/AES | ✔️ Still widely used |
| WPA3 | SAE + PMF | ✔️ Latest |
| CCMP | AES-based WPA2 cipher | ✔️ Standard |
| GCMP | Faster AES-GCM cipher | ✔️ WPA3/Enterprise modern |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.