1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Step 1: AP → STA
AP sends ANonce (a random number) to the client
Includes its MAC address and security capabilities
Purpose: Initiate key generation and prove AP is alive
Step 2: STA → AP
STA generates SNonce and derives the PTK using:
PMK
ANonce (from AP)
SNonce (from STA)
MAC addresses of both AP and STA
Sends SNonce and a MIC (calculated using PTK) to AP
Purpose: Prove STA knows PMK and begin mutual key agreement
Step 3: AP → STA
AP verifies MIC from STA (authenticity check)
AP derives PTK using same inputs
AP sends:
GTK (encrypted using PTK)
Installation instructions for keys
Another MIC
Purpose: Distribute broadcast key and finalize key setup
Step 4: STA → AP
STA verifies MIC and installs keys
Sends final acknowledgment to AP
Purpose: Confirm successful key installation