Wi-Fi Protected Access (WPA), First version of WPA. Uses TKIP for encryption and enabled the use of the PSK. , Wi-Fi Protected Access 2 (WPA2), Upgraded version of the WPA security protocol. Uses AES for encryption and supports open, personal and enterprise authentication modes. , Wi-Fi Protected Access 3 (WPA3), Newest version of the WPA security protocol. Supports the SAE protocol, which is designed to reduce the likelihood of brute-force attacks and replay attacks. , Temporal Key Integrity Protocol (TKIP), Implemented with WPA. Uses longer encryption keys and is more secure than RC4, which was used with WEP. , Advanced Encryption Standard (AES), Strongest encryption algorithm available. Uses 128, 192, or 256 bit keys and is significantly harder to crack than RC4 and TKIP. , Remote Authentication Dial-In User Service (RADIUS), AAA protocol. Allows users to remotely login to an organization's network and access resources. Uses ports 1812 and 1813., Terminal Access Controller Access-Control System (TACACS+), Proprietary AAA protocol developed by Cisco. Used to remotely access the terminal on switches, routers, firewalls, etc. Runs on port 49. , Kerberos, Used to implement SSO in a domain network. Users are given a ticket that authenticates them to each service they wish to access. , Multifactor Authentication (MFA), The use of two or more authentication factors. , Encryption, The process of converting plaintext into ciphertext. This process protects our data from eavesdropping. , Plaintext, Human readable text., Ciphertext, Text that has been scrambled and is not readable by humans. , Symmetric Encryption, Describes any form of encryption where the same key is used encrypt/decrypt data. , Asymmetric Encryption, Describes any encryption where a public key is used to encrypt data and a private key is used to decrypt data. , Public Key, A key that is available to everyone. , Private Key, A secret key that is not shared. , MITM/On-Path Attack, An attack that is performed by eavesdropping on the communications between two entities. , Replay Attack , An attack performed by resubmitting login credentials, encryption keys, etc. in order to gain unauthorized access to something. , Encryption Algorithm, Method used to transform plaintext into ciphertext. , Wired Equivalent Privacy (WEP), The first security protocol developed for use with 802.11 networks. Uses the RC4 encryption algorithm and is susceptible to brute-force attacks. , Pre-Shared Key (PSK), A password, passphrase or PIN that allows users to access a wireless network. , Enterprise Mode Authentication, When enabled, allows a user to use RADIUS, TACACS+ or Kerberos protocols. , Open Mode Authentication, No security method. Allows anyone to join the network. , Brute Force Attack , An attack performed by repeatedly entering passwords until an attacker is successful. , Entropy , Describes the randomness of the encryption key., Simultaneous Authentication of Equals (SAE), Security protocol implemented in WPA3 that strengthens the shared key exchange and helps prevent MITM and replay attacks. .

2.3: Wireless Security Protocols and Authentication Methods

Leaderboard

Visual style

Options

Switch template

Continue editing: ?