7. Wireless Encryption & Authentication Methods

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

WPA2

– began in 2004

– uses CCMP

2
New cards

CCMP block cipher mode

– Data confidentiality with AES encryption

– Message Integrity Check (MIC) with CBC-MAC

3
New cards

WPA3

– Introduced in 2018
– Uses GCMP

4
New cards

GCMP block cipher mode

– Data confidentiality with AES

– Message Integrity Check (MIC) with

– Galois Message Authentication Code (GMAC)

5
New cards

RADIUS (Remote Authentication Dial-in User Service)

• One of the more common AAA protocols

– Supported on a wide variety of platforms and devices

– Not just for dial-in

• Centralize authentication for users

– Routers, switches, firewalls

– Server authentication

– Remote VPN access

– 802.1X network access

6
New cards

TACACS

– Access-Control System

– Remote authentication protocol

– Created to control access to dial-up lines to ARPANET

7
New cards

TACACS+

– Probably a Cisco device
– More authentication requests and response codes

– Released as an open standard in 1993

8
New cards

Kerberos

• Network authentication protocol

– Authenticate once, trusted by the system

– No need to re-authenticate to everything

– Mutual authentication - the client and the server

– Protect against on-path or replay attacks