Encryption and Authentication Facts 2.3

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

What does WPA stand for?

Wi-Fi Protected Access.

2
New cards

Which encryption protocols are commonly used in WPA2/WPA3 networks?

TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard).

3
New cards

What was the purpose of TKIP?

To fix security flaws in WEP by providing a unique encryption key for each packet.

4
New cards

How does TKIP generate its encryption key?

Mixes a base key, the AP's MAC address, and a packet serial number; uses RC4 to encrypt packets.

5
New cards

Why is TKIP no longer recommended?

It is vulnerable to attacks and not considered secure.

6
New cards

What is AES and why is it preferred?

AES is a strong encryption protocol using 128-bit blocks and keys up to 256 bits; paired with CCMP for secure wireless communication.

7
New cards

What does CCMP stand for?

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol.

8
New cards

What is RADIUS?

Remote Authentication Dial-In Service; an open-standard protocol for authentication using UDP.

9
New cards

Which ports does RADIUS use?

Port 1812 for authentication/authorization, port 1813 for accounting.

10
New cards

What is TACACS+ and who developed it?

A Cisco protocol similar to RADIUS, but encrypts all packets and uses TCP port 49; only on Cisco devices.

11
New cards

What do RADIUS and TACACS+ provide?

Authentication, Authorization, and Accounting (AAA).

12
New cards

What is Kerberos and who developed it?

An authentication protocol developed by MIT; default in Microsoft Windows since 2000 and used in Active Directory.

13
New cards

What are the three "heads" of Kerberos?

Client, authentication server, and key distribution center (KDC).

14
New cards

How does Kerberos authenticate a user?

Client sends credentials → authentication server → KDC → ticket-granting ticket → session ticket for network access.

15
New cards

What is a limitation of Kerberos?

It provides authentication only, not authorization or accounting.

16
New cards

Why is Kerberos often used alongside RADIUS or TACACS+?

To provide full AAA coverage and stronger security in enterprise environments.

17
New cards

Which encryption protocol should be used in modern wireless networks?

AES with CCMP.

18
New cards

Which authentication protocols are important for enterprise wireless networks?

RADIUS, TACACS+, and Kerberos.